Xiid Blog
Subscribe
Sign in
Home
Archive
About
Latest
Top
Strengthening Cybersecurity in Financial Institutions with Xiid's Zero Knowledge Networking
In an era where digital transactions dominate the financial landscape, cybersecurity has become a paramount concern for financial institutions.
Oct 28, 2024
•
Xiid Blog
Share this post
Xiid Blog
Strengthening Cybersecurity in Financial Institutions with Xiid's Zero Knowledge Networking
Copy link
Facebook
Email
Notes
More
The Dangerous Trend of "Break-and-Inspect" in IT Security
In recent years, a troubling trend has emerged in the world of IT security: the adoption of "break-and-inspect" tools.
Oct 21, 2024
•
Xiid Blog
Share this post
Xiid Blog
The Dangerous Trend of "Break-and-Inspect" in IT Security
Copy link
Facebook
Email
Notes
More
Xiid’s SealedTunnel Solution Provides Vital Shield Against Recent CVE-2024-3094 Vulnerability of XZ Utils
Xiid solutions offer robust protection against this critical security threat.
Oct 7, 2024
•
Xiid Blog
2
Share this post
Xiid Blog
Xiid’s SealedTunnel Solution Provides Vital Shield Against Recent CVE-2024-3094 Vulnerability of XZ Utils
Copy link
Facebook
Email
Notes
More
September 2024
Xiid SealedTunnel™: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024–3400)
In the wake of the recent disclosure of a critical vulnerability (CVE-2024–3400) affecting a leading firewall solution, Xiid Corporation reminds…
Sep 30, 2024
•
Xiid Blog
1
Share this post
Xiid Blog
Xiid SealedTunnel™: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024–3400)
Copy link
Facebook
Email
Notes
More
Securing GitLab from XSS and Account Takeover Attacks: Xiid SealedTunnel™ as Proactive Defense
Recent security concerns surrounding GitLab’s major vulnerabilities highlight the ever-present threat of account takeover attacks.
Sep 23, 2024
•
Xiid Blog
1
Share this post
Xiid Blog
Securing GitLab from XSS and Account Takeover Attacks: Xiid SealedTunnel™ as Proactive Defense
Copy link
Facebook
Email
Notes
More
Solving the OpenSSH Zero Day Vulnerability’s Root Cause
The discovery of critical vulnerabilities in OpenSSH sent shockwaves through the cybersecurity community.
Sep 16, 2024
•
Xiid Blog
1
Share this post
Xiid Blog
Solving the OpenSSH Zero Day Vulnerability’s Root Cause
Copy link
Facebook
Email
Notes
More
Cisco Firewall Hack: A Wake-Up Call for Layered Security with Zero-Knowledge Networking
The recent “ArcaneDoor” cyberattack, where state-sponsored hackers exploited zero-day vulnerabilities in Cisco’s ASA firewalls, sent shockwaves through…
Sep 9, 2024
•
Xiid Blog
Share this post
Xiid Blog
Cisco Firewall Hack: A Wake-Up Call for Layered Security with Zero-Knowledge Networking
Copy link
Facebook
Email
Notes
More
Lessons Learned from the Top 12 Most-Exploited Vulnerabilities
"Malicious cyber actors generally have the most success exploiting known vulnerabilities within the first two years of public disclosure." Within the…
Sep 2, 2024
•
Xiid Blog
1
Share this post
Xiid Blog
Lessons Learned from the Top 12 Most-Exploited Vulnerabilities
Copy link
Facebook
Email
Notes
More
August 2024
An Incident like CrowdStrike’s Will Happen Again
In light of the recent CrowdStrike outage that has impacted tens of millions of computers and disrupted numerous industries worldwide, Xiid’s CTO…
Aug 26, 2024
•
Xiid Blog
1
Share this post
Xiid Blog
An Incident like CrowdStrike’s Will Happen Again
Copy link
Facebook
Email
Notes
More
The Internet Is Not Secure By Design. What can we do about it?
Even though traditional network designs treat security as an afterthought, these strategies easily wrap vulnerable attack surfaces in unpenetrable…
Aug 19, 2024
•
Xiid Blog
1
Share this post
Xiid Blog
The Internet Is Not Secure By Design. What can we do about it?
Copy link
Facebook
Email
Notes
More
What on earth is going on in device security?
In the last few weeks, there have been an avalanche of show-stopper vulnerabilities. Is there an underlying issue we're failing to treat?
Aug 12, 2024
•
Xiid Blog
4
Share this post
Xiid Blog
What on earth is going on in device security?
Copy link
Facebook
Email
Notes
More
Are critical ZTNA mistakes compromising your network?
Zero Trust deployments commonly suffer from major vulnerabilities that kill your network security – learn what they are and how to fix them.
Aug 2, 2024
•
Xiid Blog
1
Share this post
Xiid Blog
Are critical ZTNA mistakes compromising your network?
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts