CGW Deployment on Azure
CGW VM Deployment on Azure Pre-requisites Privileged login and subscription on Azure portal to create VMs, networks, subnets and route tables. OS: Ubuntu 22.04 (Recommended) CPU: 1 vCPU RAM: 1 GB HDD: Standard with size > 30GB Network Interfaces: 2 (WAN and LAN) WAN on subnet1 – Connectivity to Internet (Default gateway pointing to WAN […]
Traditional security no longer reliable, SASE solutions on the up
At the same time, SASE’s single-pass architecture will help securely deliver the performance promises of 5G. But it is unlikely that these two adjacent technologies can be seamlessly integrated, as their core architectural differences mean that integration can only take place by re-building SASE on 5G standards. Presently, only Exium’s Intelligent Cybersecurity Mesh seems to […]
Exium, Teneo team to deliver digital experience, 5G-capable SASE platform
Work-from-anywhere IT services company and cyber security provider enter into partnership to assist lean enterprise IT teams in their transition to a secure access service edge Teneo has announced a partnership with Exium to assist lean enterprise IT teams in their transition to a secure access service edge (SASE), with the aim of further strengthening […]
Addressing Log4j Vulnerability
Log4j is a ubiquitous piece of software used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information. Recently, a very serious remote code execution (RCE) vulnerability in the popular Java logging package, Log4j (CVE-2021-44228) was disclosed, posing a severe risk to millions […]
What Security Tech Will CISOs Buy in 2022?
The big events of the last two years — COVID-19 and ransomware — put a fine point on the importance of cybersecurity. And in 2022 that’s going to translate into bigger security technology budgets. A recent ESG report, for example, found that 69% of technology decision makers say their organization will increase security technology spending this year, and IDC forecasts security product […]
Equinix opens 5G and Edge Technology Development Center in Dallas
The first company to take advantage of the facility is Exium, which has run its Secure Edge capabilities to enable secure, seamless multi-access edge compute functionality with tightly integrated security and network functions that extend from the cloud to edge locations and to individual devices. Equinix says that deploying Exium’s technology in its data centers […]
Exium offers 5G network security to IBM EAM
IBM has chosen Exium as a network-as-a-service partner for companies using the IBM cloud to analyze data from edge devices spread across enterprise data centers and remote locations. Exium provides a secured 5G network for using the IBM Edge Application Manager (EAM). EAM is centralized software for deploying and managing analytics workloads on edge nodes across hundreds of […]
IBM taps Exium for 5G edge security
IBM selected security start-up Exium to help customers run AI or IoT applications across hybrid cloud environments, laying the groundwork for 5G-enabled IoT and private networking. The company will sell Exium’s services in tandem with its open source Edge Application Manager, with customers paying the start-up a monthly fee per device. Industrial automation, healthcare and […]
Exium Works with IBM to Deliver Edge Solution
Exium, a 5G cybersecurity startup, is working with IBM (NYSE: IBM) to offer edge computing based on Red Hat OpenShift. The deal is intended to be the first of a series of partnerships aimed at spreading Exium’s secure network-as-a-service (NaaS) across 5G-based hybrid cloud environments. Exium’s offering is already in trials with large enterprise customers, […]
World’s First 5G Clean Network Takes Flight
Imagine lightning-fast multi-Gbps peak data speeds, zero latency, enormous network capacity, and a uniform user experience regardless of the physical location of your device. Thanks to the 5G wireless technology, this fantasy of avid data consumers is on the verge of turning into a full-fledged reality as 5G compatible devices slowly make their way into […]
Cyber Threat Intelligence, a.k.a. The Art of War
Cybersecurity is a thriving industry, both from the protection and prevention perspective and the threat actors and their growing arsenal. The good guys face a seemingly endless number of challenges. At times, it can seem impossible. Cyber threat intelligence (CTI) is the best solution to address the growing number of bad actors, the enormous amount […]
Why Apple has security built into their hardware?
As we move deeper into the Information Age, security measures are evolving to secure our more widely dispersed data and identities. Gone are the days of only looking for the “https” in URLs. We can no longer feel secure seeing a lock symbol next to the URL in the browser. Carefully “blocking the view” when […]
Exium launches Secure 5G NaaS powered by a zero-trust Intelligent Cybersecurity Mesh
Exium announced the premiere of its Secure 5G network as a service, based on the emerging Clean Network standards being promulgated by the US, EU and other freedom-loving nations. Exium’s 5G network service is built on an open, programmable, reliable, and software-driven Intelligent Cybersecurity Mesh that treats the internet itself as Zero Trust and relies heavily […]
Protecting Users, Data and Apps with a Cloud Security Gateway
If you’ve ever seen a “blocked page” screen while surfing the Internet at the office, your company uses URL filtering. IT has the responsibility to maintain a “blacklist” of URLs or search terms. This blacklist blocks access to pages that violate company policies or may contain malware. URL filtering occurs at the basic level, but […]
Safely Directing Network Traffic
Strict DNS security measures protect against malware attacks When we reference a website or a network server, we use (mostly) readable names, not the destination Internet Protocol (IP) address. Names are easier to remember and share. Imagine if we didn’t use domain names. “Check out today’s graphic on 172.217.2.238!” All network-connected devices (i.e., computers, smartphones, […]
The Secret of Cybersecurity Compliance
Cyber threats are lurking everywhere, and malicious actors are always ready to exploit an organization’s vulnerabilities and weak points. Making your organization cybersecurity compliant is an integral way to protect the confidentiality and integrity of sensitive information. Cybersecurity Compliance means adhering to various regulatory controls and guidelines to safeguard data. These controls vary from industry […]
Exium, a ‘clean network’ company, comes out of stealth mode
Exium, a Palo Alto, California-based company focused on “clean network” standards that the U.S. government trumpeted last year, has emerged from stealth mode. Led by Farooq Khan, the company has announced its “Secure 5G network as a service.” The company’s network service is built on an open, programmable, software-driven cybersecurity mesh technology that relies heavily on strong encryption. […]
Zero Trust Network Access
Security in most organizations is focused on keeping intruders out. Cyberattacks have become much more precise in their methods, and we can no longer explicitly trust our own people – those on the inside. In an article published by CSO Online, contributing writer Kary Pratt described Zero Trust as, “The Zero Trust model of information […]
Wolves Among the Sheep
The Importance of Network Encryption in Protecting our Privacy Are you aware that shepherding is still an occupation today? The demand is less due to modern ranching practices and a reduction in natural predators, but there are still shepherds watching over their herds as they roam the pastures. The occupation arose to protect the sheep […]
Autonomous Threat Prevention
When it comes to enterprise security, prevention is better than cure. A recent study conducted by the University of Maryland confirmed that threat actors attack every 39 seconds, averaging 2,244 times a day. The insurgence of cybercrimes is forcing organizations to re-evaluate their security strategies. In the purely digitized world of today, a growing influx […]
Preventing Compromised Credentials and Insider Threats
Compromised accounts and insider threats are the main ingredients behind most data breaches of today. Breached credentials are an easy and inconspicuous way of penetrating accounts and getting access to personal user data. According to Cybersecurity Insiders’ 2020 Insider Threat Report, 63% of organizations believe that privileged IT users cause the biggest threat to security. […]
Unique Security Challenges with the Convergence of IT/OT
By the end of 2023, security and risk management (SRM) leaders will need to adjust their OT cybersecurity solutions because 60% of today’s point solution OT security providers will have been rebranded, repositioned or bought, or will have disappeared – Gartner IT (Information Technology) and OT (Operational Technology) were two separate domains until recently when […]
Block Zero-Day Threats with Cloud-Based Sandboxing
When it comes to threat prevention and mitigation, there is no such thing as a one-size-fits-all solution. The legacy anti-malware techniques gained a lot of popularity over the years, but they come with their share of glitches. Most anti-malware and anti-ransomware solutions rely on signatures and common threat indicators for threat detection and are not […]
No One Crosses the Line, The Technology Used in Next-Gen Cloud Firewalls
A firewall serves one purpose. It denies passage. IT firewalls are put in place to prevent unauthorized access to a network. In the past, a network firewall was a separate piece of hardware installed at the entry point. All incoming traffic was checked at the firewall, and only friendly traffic was allowed to pass through […]
5G Clean Network
Imagine lightning-fast multi-Gbps peak data speeds, zero latency, enormous network capacity, and a uniform user experience regardless of the physical location of your device. Thanks to the 5G wireless technology, this fantasy of avid data consumers is on the verge of turning into a full-fledged reality as 5G compatible devices slowly make their way into […]
Automatic eSIM Provisioning and Activation
With the wide adoption of eSIM technology, the dreaded SIM swapping phenomena is finally coming to an end. The term “eSIM” simply stands for an embedded SIM card or chip which requires no physical swapping. This tiny embedded chip works in a similar fashion to the NFC chip that is widely used for Apple Pay […]
Multi-Cloud Networking Simplified
“Most organizations adopt a multi-cloud strategy out of a desire to avoid vendor lock-in or to take advantage of best-of-breed solutions.” Michael Warrilow, VP Analyst, Gartner The ever-expanding cloud services, the looming threat of data loss, unplanned downtime, and improper distribution of computing resources are all pushing organizations to avoid cloud vendor lock-ins. More […]
Protection from Distributed Denial of Service (DDoS) Attacks
A distributed denial of service (DDoS) attack is an intentional attempt to consume the resources of a network, website, service, or application. A tangible example is a large crowd of people blocking the entrance to a store, preventing anyone from entering. If no one can enter the store, service is denied. A DDoS attack is […]
General Data Protection Regulation (GDPR)
The GDPR stands for the General Data Protection Regulation, which is a comprehensive EU data protection law, adopted in May 2016, updating the existing EU data protection law (the 1996 Data Protection Directive) to further strengthen the protection of personal data of individuals in the EU. It takes full effect on May 25, 2018. […]
International Organization for Standardization (ISO 27001)
ISO 27001 provides an international methodology for implementing, managing, and maintaining information security within a company. This information security management system (ISMS) framework minimizes risk and ensures business continuity by proactively limiting the impact of a security breach. ISO 27001 is a globally recognized information security standard, with more than 40,000 organizations certified. ISO […]
Service Organization Controls (SOC2)
SOC2 is a compliance report standard defined by the American Institute of Certified Public Accountants (AICPA). These SOC2 compliance reports provide users with assurances about the controls at a service organization relevant to security availability and processing integrity of the systems used to process users’ data. It also covers the confidentiality and privacy of the […]
World’s First 5G Clean Network Takes Flight
Imagine lightning-fast multi-Gbps peak data speeds, zero latency, enormous network capacity, and a uniform user experience regardless of the physical location of your device. Thanks to the 5G wireless technology, this fantasy of avid data consumers is on the verge of turning into a full-fledged reality as 5G compatible devices slowly make their way into […]
Exium Debuts “Clean” 5G for Private Wireless
An intriguing startup named Exium has released what it terms a Secure 5G network-as-a-service (NaaS) that follows U.S. “clean network” standards. The news is an interesting take on the issues of network security in private 5G wireless deployments. Exium, founded in 2019 by wireless telecommunications expert Farooq Khan (ex-Phazr, ex-JMA Wireless) offers what it calls a cybersecurity […]