Are you CJIS-Compliant?

| | Blog
Eclypsium helps ensure Criminal Justice Information Services compliance The Criminal Justice Information Services (CJIS) is the largest division of the US Federal Bureau of Investigation (FBI) and a centralized source of criminal justice information (CJI) for state, local, and federal law enforcement and criminal justice agencies and authorized third parties ... Read More
Eclypsium Announces Version 2.16

Eclypsium Announces Version 2.16

| | Blog
The Eclypsium team is pleased to announce version 2.16 of the platform. This release introduces new features that further support our supply chain coverage, including the detection of recent threats and device analysis. Supply Chain Vulnerability & Threat Coverage Eclypsium dynamically updates content to ensure customers have the latest vulnerability ... Read More

5 Ways to Use Eclypsium to Align with the National Cybersecurity Strategy

| | Blog
On March 1st, 2023 the White House published an official update to the National Cybersecurity Strategy. This document further defines the nation’s focus on critical cybersecurity issues, and builds on the groundwork set forth in previous executive actions such as Executive Order 14028, Improving the Nation’s Cybersecurity and the Executive ... Read More
What You Need to Know About the Latest KEV Updates

What You Need to Know About the Latest KEV Updates

| | Blog
In June of last year, we published our first review of the vulnerabilities in CISA’s Known Exploited Vulnerabilities (KEV) Catalog. Of course, security never stands still, and the KEV has steadily been updated as adversaries have shifted their tactics to exploit new vulnerabilities. In this blog, we will take a ... Read More

Sneaky malware BlackLotus can bypass important Windows boot functions

Eclypsium, which specializes in firmware and hardware security, followed up with a post Thursday calling BlackLotus “the first in-the-wild bootkit that can bypass Secure Boot.” Read More > The post Sneaky malware BlackLotus can bypass important Windows boot functions appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ... Read More
Not-So-Secure Boot - Jesse Michael, Mickey Shkatov - PSW #751

BlackLotus – A Threat Coming To A System Near You

| | Blog
What is “BlackLotus”? Following news in late 2022 of a new UEFI bootkit being sold for $5,000 on hacking forums called BlackLotus. ESET researchers have recently released an analysis of this bootkit discovered in the wild. There was speculation as to whether or not BlackLotus was real and did what ... Read More

The Root of Supply Chain Security: What You Need to Know About NIST 1800-34

| | Blog
Today, virtually every business and mission-critical task depends on complex technology supply chains, and organizations need to know for certain that these assets are authentic, unaltered, and free of threats and vulnerabilities. But this can be a lot trickier than it sounds. Technology supply chains often rely on a web ... Read More
AWS Shared Responsibility Model

Avoid AWS Lambda Risks

Reading Time: 8 minutes There’s no question that AWS Lambda remains the incumbent leader for serverless computing. Lambda’s recent enhancements, including the ability to allocate up to 10 GB of memory to a Lambda function (a threefold increase) and the ability for users to have up to six CPUs in ... Read More
Cloud migration and enterprise cloud security

Cloud Migration Has Ended Enterprise Datacenter

Reading Time: 5 minutes Over the last few years, enterprises have increasingly shifted away from traditional data centers. For example, in late 2019 Gartner famously predicted that 80% of enterprises plan to shut down their traditional data centers entirely by 2025. Cloud migration is a major trend industry analysts have ... Read More