Blog

Digital cybersecurity shield representing quantum-resilient data protection with AI-powered defenses and network encryption.

Rixon Technology’s Zero Data Architecture Selected for National Cybersecurity Evaluation by FDD Think Tank

We are proud to announce that Rixon Technology has been selected for an independent cybersecurity evaluation by the Foundation for Defense of Democracies (FDD), a respected Washington-based think tank advising the White House and U.S. policymakers on national security, critical infrastructure protection, and technological innovation. Who Is the Foundation for Defense of Democracies (FDD)? FDD …

Rixon Technology’s Zero Data Architecture Selected for National Cybersecurity Evaluation by FDD Think Tank Read More »

Person typing on a laptop with virtual profiles displayed, representing digital character-based hiring.

Revolutionizing Hiring with Character: How KANNY and Rixon Build Trust Through Privacy

A New Era of Character-Based Hiring In today’s competitive job market, hiring transcends resumes and interviews; it’s about understanding a candidate’s character. KANNY, developed by Sean Vassilaros and powered by Rixon Technology, introduces a groundbreaking approach to character-based hiring. By leveraging anonymous employee feedback and vaultless tokenization, KANNY provides actionable insights into traits like integrity, …

Revolutionizing Hiring with Character: How KANNY and Rixon Build Trust Through Privacy Read More »

Ripple effect visualization of interconnected systems in cyber infrastructure.

What Makes an Organization Cyber-Resilient? An Interview with Dr. Georgianna Shea

“Focus more on resilience than cybersecurity.” – Dr. Georgianna Shea Published on April 02, 2025 by Rixon Technology In this episode of the Rixon Podcast, Dr. Georgianna Shea, Chief Technologist at the Foundation for Defense of Democracies and board member of Rixon Technology, joins host Heidi Trost for a deep dive into cyber-resilience—a concept that’s …

What Makes an Organization Cyber-Resilient? An Interview with Dr. Georgianna Shea Read More »

Why Most Security Strategies Fail—And How to Fix Them

Short-Term Thinking, Long-Term Risk   Addressing Management’s Misguided Security Practices   Many organizations treat cybersecurity as a compliance checklist rather than a proactive defense strategy. This short-term mindset prioritizes passing audits over real security resilience, leaving businesses vulnerable to evolving cyber threats. While security tools like encryption, firewalls, and VPNs were once sufficient, they no …

Why Most Security Strategies Fail—And How to Fix Them Read More »

cloud security platform

Why Cloud Data Protection Needs an Additional Layer of Security

64% of respondents in a recent study cited data loss or leakage as their biggest cloud security concern. Data privacy and confidentiality issues took second place, followed by the accidental exposure of credentials. It’s a grim reminder that while accelerating the pace of cloud migration is a top priority for many businesses, the efficacy of …

Why Cloud Data Protection Needs an Additional Layer of Security Read More »