May 5, 2015
CDM Phase 2 (Audio)
Ken Ammon, the chief strategy officer of Xceedium, told Federal Drive hosts Tom Temin and Emily Kopp what’s in store for phase two of CDM.
April 11, 2015
Seizing the Moment
Dibya Sarkar of Fierce Government IT quotes cybersecurity experts from RAND Corporation, Dell, and Xceedium’s CSO Ken Ammon in an article focused on how the federal government can and should leverage available cybersecurity strategies in light of the recent cyberattacks on both federal and civilian organizations.
April 7, 2015
Dibya Sarkar surveys the current cybersecurity landscape of in the wake of cyber-terrorism, including North Korea’s attack on Sony Pictures Entertainment, which Xceedium’s Ken Ammon calls a digital “Pearl Harbor”.
March 31, 2015
Privileged ID management and the new security perimeter
Ken Ammon, CSO of Xceedium, explains why “Identity must be considered an integral element of security, knit into the fabric of our next generation IT infrastructure” and how to fill the gaping hole in the current security clearance process.
March 5, 2015
The uncertain marriage of CDM and FedRAMP
Sean Lyngaas of FCW reports on hurdles to the seemingly synergistic relationship between CDM and FedRAMP. Xceedium’s Ken Ammon provides some context on the CDM program.
March 1, 2015
DHS Readies Next Phase of Cybersecurity Conformity
Written by Signal’s Sandra Jontz, this article details how the DHS is tackling identity management in CDM Phase 2. Xceedium’s Ken Ammon helps to explain the history and necessity of the federal overhaul.
February 27, 2015
Cybergeddon: Why the Internet could be the next “failed state”
Ars Technica’s Sean Gallagher draws disturbing parallels between today’s Internet and late 70’s New York — and now, like then, the feeling is everything could go to hell with just the slightest push. Our Ken Ammon shares his views on how to stave off the potential failure.
February 25, 2015
How (and why) the CIA plans to expand cyber capabilities
In an article by Sean Lyngaas, Xceedium’s Ken Ammon discusses how, and why, the CIA plans to expand its cyber capabilities.
February 19, 2015
Expert Advice: How to Up Your Cyber Security
Entrepreneur’s Ann C. Logue speaks with Xceedium’s Ken Ammon to discuss ways companies can protect themselves fro the seemingly never-ending rash of damaging data breaches and thefts of intellectual property. Ken talks about the importance of assessing the security stance of business partners and provides guidance on how best to protect yourself from insider and outsider attacks.
January 26, 2015
Lack of security in small companies means big risk for the enterprise
CSO’s David Geer explains how small businesses share their vulnerabilities with their larger customers, making it easy to access those networks. Xceedium’s Mo Rosen discusses why hackers use small business networks as a portal to larger, more lucrative targets, ways businesses can push back, and how privileged identity management can be implemented to mitigate risk.
The Federal Financial Institutions Examination Council (FFIEC) has issued a Joint... Read More
Xsuite delivers support for CDM Phase 2 Least Privilege and Infrastructure Integrity Requirements...Read More