Partners - Support - Contact Us

Xceedium News Coverage

Ars Technica

February 27, 2015

Cybergeddon: Why the Internet could be the next “failed state”
Ars Technica’s Sean Gallagher draws disturbing parallels between today’s Internet and late 70’s New York — and now, like then, the feeling is everything could go to hell with just the slightest push. Our Ken Ammon shares his views on how to stave off the potential failure.

Federal Computer Week

February 25, 2015

How (and why) the CIA plans to expand cyber capabilities
In an article by Sean Lyngaas, Xceedium’s Ken Ammon discusses how, and why, the CIA plans to expand its cyber capabilities.


February 19, 2015

Expert Advice: How to Up Your Cyber Security

Entrepreneur’s Ann C. Logue speaks with Xceedium’s Ken Ammon to discuss ways companies can protect themselves fro the seemingly never-ending rash of damaging data breaches and thefts of intellectual property. Ken talks about the importance of assessing the security stance of business partners and provides guidance on how best to protect yourself from insider and outsider attacks.


January 26, 2015

Lack of security in small companies means big risk for the enterprise
CSO’s David Geer explains how small businesses share their vulnerabilities with their larger customers, making it easy to access those networks. Xceedium’s Mo Rosen discusses why hackers use small business networks as a portal to larger, more lucrative targets, ways businesses can push back, and how privileged identity management can be implemented to mitigate risk.

Signal Magazine

January 13, 2015

U.S. Central Command Twitter Feed Hacked
Xceedium’s Ken Ammon questions password policies in place at U.S. CENTCOM, following the hack of the service’s Twitter and You Tube accounts by sympathizers of the Islamic State militant Group. As noted by Signal Magazine editor Sandra Jontz, the hack took place the same day President Obama delivered a speech on recent cybersecurity modifications to government regulations — timing that Ammon sees as purposeful.

Signal Magazine

January 1, 2015

Internet of Things Promises to Transform Life, But at What Cost?
Researchers predict between 26 billion and 100 billion devices will be connected to the Internet of Things by 2020, and Signal Magazine editor Sandra Jontz explores the resulting security implications in this cover story. Xceedium’s Ken Ammon provides a perspective on insider threats in this environment, and the broader risk privileged users can pose to the security of the massive amount of data that is being produced.

Government Security News

December 30, 2014

The Do’s and Don’ts of privileged user access control
Xceedium’s Ken Ammon writes that establishing privileged user access controls are a critical element of an agency’s security program – but can be a complex undertaking given the number of regulations and programs involved. In this article, he tackles the basics with a focused list of “Do’s and Don’ts” that will get you started down the path to managing and controlling these high risk users.


December 17, 2014

Will CDM finally be ‘the realization of IT security’?
Phase II of the Department of Homeland Security’s Continuous Diagnostics and Mitigation program could be a major step forward in Federal security, and could be “transformative, rather than evolutionary” according to Xceedium’s Ken Ammon.

Network World

November 24, 2014

5 ways to escape password hell
Passwords and multi factor technologies can “confuse the hell out of users,” according to this Network World article by Maria Korolov. Xceedium’s Ken Ammon argues for starting with privileged users to gain the biggest return on authentication investments. (Registration required)

Federal Times

November 19, 2014

CDM Phase II centers on monitoring user privileges, activities
Federal Time’s Aaron Boyd provides a look at the DHS’s Continuous Diagnostic and Mitigation (CDM) Phase II, with Xceedium’s Ken Ammon offering insights into what the program means for departments and agencies.


Blog: Anthem: This Time It’s Different

News of yet another major security breach — this one at insurer Anthem — has... Read More

CDM Phase II is Here

Xsuite delivers support for CDM Phase 2 Least Privilege and Infrastructure Integrity Requirements...Read More

Video: 2-Minute Explainer

This quick video, just two minutes in length, will rapidly deliver insights into the risks posed by privileged users, and how Xsuite circumvents the risks.Read More