Skip to the content

Encryption is only the beginning of Protection

As with most breaches this one began with the target company having a weak security position and utilizing products that were only partial solutions to a critical problem.  Encrypting their databases would normally protect sensitive data from exposure if the hack is simple, but more complex hacks involving the ability to acquire administrator level access require a more diverse and encompassing level of security.

SQrazorLoc, our database protection product, is such a solution because it doesn't stop at merely protecting the database, it also protects what applications can then access the database through it's secure gateway.

Individual Autonomy will become ever more important

As more and more groups look to use information extracted from the internet about individuals, the phrase "Individual Autonomy" will have ever deeper meaning.  At present the information the IMF is proposing to use in the setting of credit scores is freely available thanks to data mining at all levels of an individual's virtual life.  From browsing histories to online purchases, from online gaming to tweets on twitter, all of these experiences are mined to their maximum for information about the individuals involved.  And all of this is done with no control by the individual who's data is being mined much less any knowledge that it even occurs.

NEWS: CYPHYX technology could have protected America from Cyber Attack

CYPHYX has a solution to this problem, one that we use ourselves for products that are critical in protecting sensitive data, messages, and access.  Using two of our patented technologies we are able to both secure the update to ensure it remains free of tampering as well as secure the update process to ensure update being applied is legitimate and verified prior to the installation in real-time.

Who do you Trust with your Data?

At present every time you browse the internet your actions, the sites you visit, the products you buy, the activities you participate in online, almost every you do is tracked, logged, and processed for value.  As people become ever more aware of this fact of their virtual lives they will take ever greater action to stop it especially as it begins to affect their normal lives outside the internet.  This is why CYPHYX has a primary goal of giving control back to the individual.  We call it "Individual Autonomy", but really it is how things always should have been.  Between Government and the Big Tech companies, there really hasn't been much protection for the individual, until now.  CYPHYX plans to change that and give control back to the individual.

NEWS: CYPHYX is featured in a New York Daily News Editorial

Vote for security: Give a promising tool to protect voter databases a fair shot

Whether it's the Russians or the Chinese or domestic hackers or even the Martians, we don't want anyone fooling with our elections. Every reasonable measure should be taken to safeguard the vote. So why has a company called CYPHYX, which offers a promising registered-voter database integrity tool, gotten the runaround from partisan New York elections officials?

NEWS: CYPHYX has received a commitment from Niagara County to perform a Pilot project

Niagara county in the State of New York has signed a letter of intent for CYPHYX to perform a no-risk, no-cost pilot of SQrazorLoc.  This is an excellent opportunity for CYPHYX to showcase our product and show how it functions transparently with the counties existing applications while securing the databases from being hacked.

NEWS: CYPHYX is pleased to announce the release of SQrazorLoc version 1

SQrazorLoc version 1 is a major accomplishment for CYPHYX and shows our commitment to developing new products to meet the demands of the market that are not currently met by existing products.

NEWS: CYPHYX attended the NYSECA Winter Conference

CYPHYX management attended the New York State Election Commissioners Association Winter Conference that was held in Albany New York on January 6th thru the 9th.

NEWS: CYPHYX President Chuck Sammet was interviewed on the SNN Network

CYPHYX President Chuck Sammet was interviewed by Robert Kraft of SNN Network during the MicroCap Rodeo in Austin Texas.  He was able to provide a overview of the company and the vision for where CYPHYX is headed in the future.

NEWS: CYPHYX to attend The MicroCap Rodeo in Austin Texas

CYPHYX management will be attending the MicroCap Rodeo being held in Austin Texas on October 15th and 16th. 


NEWS: CYPHYX in discussions with New York State Board of Elections

CYPHYX has started discussions with the State Board of Elections for New York concerning our desire to assist in securing the elections next year by securing the voter databases using our product, SQrazorLoc. 

Compromised passwords are only part of what's wrong with Cybersecurity for the consumer

A solution that combines both data protection and authentication is what Internet of Things devices such as cameras, lights, and sensors need to fully secure their use.  Half measures such as digital certificates and user changeable passwords are only the equivalent of a band-aid stuck over a serious wound.

Why Cybersecurity Must Be a Top Priority for Small & Midsize Businesses

While insurance can help to alleviate some of the financials costs, it cannot repair the damage done to reputation or customer trust.  The better solution is to implement a system of prevention, protection, and detection along with awareness for employees.  These steps will help to reduce and eliminate in most cases the reason breaches occur.

MySQL Design Flaw Allows Malicious Servers to Steal Files from Clients

SQrazorLoc ensures that your application only connects to known databases and provides reporting data that shows what applications are connecting to which databases.

Another huge database exposed millions of call logs and SMS text messages

If instead that had implemented complete security on the database, encrypted the data and set some level of authentication to access the data then it wouldn't have happened.  The problem here is maintaining a process to ensure that lapses in security do not happen.

Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security

With the CYPHYX patented technology called DARE, Dynamic and Random Encryption, you can have one time pads now instead of having to wait for Quantum Key Distribution later.

The Shocking Cost of a Data Breach to Small and Medium Sized Businesses

For the current Cybersecurity market, Detection seems to be the go to solution.  Only problem with products being so focused on detection is that once they detect the breach or intrusion then the costs really begin to escalate for detection.  With CYPHYX products prevention is the primary focus and not detection because prevention is far more cost effective than mere detection. 

NEWS: CYPHYX engages Redland Strategies to assist with Business Development

In October CYPHYX entered into a partnership with Redland Strategies to provide business development assistance.  CYPHYX is looking forward to this partnership leading to exciting opportunities for growth and enhancement of our market and brand.  Redland Strategies brings a wealth of experience and knowledge in the cybersecurity space to the table and this will greatly assist CYPHYX in becoming a market leader with products that solve real world problems many companies are currently facing.

PR: CYPHYX Announces Vice President of Business Development and Government Relations

The staff and current board of CYPHYX are happy to announce that a manager of the company, Robert J. DiCarlo, has accepted the position of Vice President for Business Development and Government Relations. CYPHYX, is working hard to establish itself as a leader and innovator in Cybersecurity and in his new position, Robert provides a strong base for future growth.

For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.

Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"


12870 Trade Way Four
Suite 107  #665
Bonita Springs, Fl. 34135