Partners - Support - Contact Us

Xceedium News Coverage

Federal Times

March 31, 2015

Privileged ID management and the new security perimeter

Ken Ammon, CSO of Xceedium, explains why “Identity must be considered an integral element of security, knit into the fabric of our next generation IT infrastructure” and how to fill the gaping hole in the current security clearance process.

Federal Computer Week

March 5, 2015

The uncertain marriage of CDM and FedRAMP

Sean Lyngaas of FCW reports on hurdles to the seemingly synergistic relationship between CDM and FedRAMP.  Xceedium’s Ken Ammon provides some context on the CDM program.

Signal Magazine

March 1, 2015

DHS Readies Next Phase of Cybersecurity Conformity

Written by Signal’s Sandra Jontz, this article details how the DHS is tackling identity management in CDM Phase 2.  Xceedium’s Ken Ammon helps to explain the history and necessity of the federal overhaul.

Ars Technica

February 27, 2015

Cybergeddon: Why the Internet could be the next “failed state”
Ars Technica’s Sean Gallagher draws disturbing parallels between today’s Internet and late 70’s New York — and now, like then, the feeling is everything could go to hell with just the slightest push. Our Ken Ammon shares his views on how to stave off the potential failure.

Federal Computer Week

February 25, 2015

How (and why) the CIA plans to expand cyber capabilities
In an article by Sean Lyngaas, Xceedium’s Ken Ammon discusses how, and why, the CIA plans to expand its cyber capabilities.


February 19, 2015

Expert Advice: How to Up Your Cyber Security

Entrepreneur’s Ann C. Logue speaks with Xceedium’s Ken Ammon to discuss ways companies can protect themselves fro the seemingly never-ending rash of damaging data breaches and thefts of intellectual property. Ken talks about the importance of assessing the security stance of business partners and provides guidance on how best to protect yourself from insider and outsider attacks.


January 26, 2015

Lack of security in small companies means big risk for the enterprise
CSO’s David Geer explains how small businesses share their vulnerabilities with their larger customers, making it easy to access those networks. Xceedium’s Mo Rosen discusses why hackers use small business networks as a portal to larger, more lucrative targets, ways businesses can push back, and how privileged identity management can be implemented to mitigate risk.

Signal Magazine

January 13, 2015

U.S. Central Command Twitter Feed Hacked
Xceedium’s Ken Ammon questions password policies in place at U.S. CENTCOM, following the hack of the service’s Twitter and You Tube accounts by sympathizers of the Islamic State militant Group. As noted by Signal Magazine editor Sandra Jontz, the hack took place the same day President Obama delivered a speech on recent cybersecurity modifications to government regulations — timing that Ammon sees as purposeful.

Signal Magazine

January 1, 2015

Internet of Things Promises to Transform Life, But at What Cost?
Researchers predict between 26 billion and 100 billion devices will be connected to the Internet of Things by 2020, and Signal Magazine editor Sandra Jontz explores the resulting security implications in this cover story. Xceedium’s Ken Ammon provides a perspective on insider threats in this environment, and the broader risk privileged users can pose to the security of the massive amount of data that is being produced.

Government Security News

December 30, 2014

The Do’s and Don’ts of privileged user access control
Xceedium’s Ken Ammon writes that establishing privileged user access controls are a critical element of an agency’s security program – but can be a complex undertaking given the number of regulations and programs involved. In this article, he tackles the basics with a focused list of “Do’s and Don’ts” that will get you started down the path to managing and controlling these high risk users.

Key Management

Blog: FFIEC Issues Warnings And Guidance Around Credential...

The Federal Financial Institutions Examination Council (FFIEC) has issued a Joint... Read More

CDM Phase II is Here

Xsuite delivers support for CDM Phase 2 Least Privilege and Infrastructure Integrity Requirements...Read More

Video: 2-Minute Explainer

This quick video, just two minutes in length, will rapidly deliver insights into the risks posed by privileged users, and how Xsuite circumvents the risks.Read More