While others grow logos,
We deliver MISSION CERTAINTY.

Left of Boom Technologies is the only one preventing the breach of your network before it happens.

2026 Threat Intelligence

The Threat Landscape Has Shifted

► CrowdStrike Global Threat Report 2026
"Nation-state actors exploit zero-days 40% faster, blending AI with human-targeted phishing."
EKI™ Fix

LoB blocks the exploit before the first handshake ever completes.

► Ivanti Everywhere Work Report 2026
"78% of breaches stem from unpatched OT vulnerabilities like command injection."
EKI™ Fix

LoB blocks external command ingestion on OT devices — instant prevention, zero downtime.

► World Economic Forum — Global Cybersecurity Outlook 2026
"Cybersecurity risk in 2026 is accelerating, fueled by advances in AI, deepening geopolitical fragmentation and the complexity of supply chains."
"94% of leaders say AI is the most significant driver of cybersecurity change this year; 87% flag AI vulnerabilities as the fastest-growing risk."
EKI™ Fix

EKI™'s ephemeral, physics-layer authentication renders AI-accelerated credential attacks structurally impossible. No credential to steal. No handshake to intercept.

EKI™ Technology

EKI™ Device Authentication Engineered for Mission Certainty

No math, no secrets, ephemeral keys. EKI™ goes where no attacker can follow.

  • All natural entropy — no algorithms — mathematically unguessable…
  • No secrets transmitted — physics correlation only, nothing to intercept
  • Man in the Middle attacks impossible — physics cannot be forged or replayed
  • Living off the Land attacks defeated — no key replay
  • 200ms key rotation crushes PKI's annual cycle
  • Up to 10 key rotations per second — even on IoT devices
  • No algorithms means it is quantum-proof and defeats Shor's algorithm.
  • Swarm AI at the Edge: Biomimetic Intelligence, Self-Aware Protection—Engineered for Mission Certainty.
  • Drop-in PKI replacement — no rip and replace required
The Team

The Team Makes a Difference

Others build teams to grow companies. We assembled our team to solve cybersecurity's hardest problems.

Co-Founders & Executive Leadership
► Technology Architect · CTO · Co-Founder · Board Member
John Ellingson

The Inventor behind EKI™'s quantum-proof authentication, holding multiple foundational cybersecurity and device-authentication patents — including systems for ephemeral, rotating machine identities that eliminate static credentials and protect SoC and network communications.

His earlier AI and identity-verification inventions underpin large-scale fraud detection in U.S. financial services, providing the IP and technical lineage that makes EKI™'s millisecond, ephemeral-key architecture both mathematically secure and operationally proven today.

► Finance Architect · CFO · Co-Founder · Board Member
Eric Evans

Co-founder of Left of Boom and partner at Evans Hagan. The finance architect behind LoB's commercialization and exit strategy.

He translates the EKI™ IP moat into structured deals, pricing, and royalty flows that fit Vision 2030, bridge-lender returns, and post-exit V2/V3 development — making LoB's quantum-proof platform consumable for sovereign funds and strategics.

► CIO · Major Shareholder · Enterprise Implementer
Sougata Pal, PhD

The applied-information leader who turns EKI™ and the LoB application into deployable, hardened solutions.

Combines hands-on engineering and CISO-level operational experience, making LoB's quantum-proof architecture real in IoT, IIoT, and critical-infrastructure deployments rather than remaining a paper design.

Board — National Security & Deep-Tech
NSA-Grade Technical Oversight · Board Member
Fred Walker

Fredrick Walker served over 38 years at the National Security Agency (NSA), specializing in security and counterintelligence. As Technical Director for Counterintelligence Knowledge Management, he advised on insider risk and information protection strategies.

Following his retirement in 2019, he founded BigWhiskey Solutions LLC, providing advisory services in insider risk and security.

Los Alamos National Laboratory Deep-Tech Bench · Board Member
Steve Poole

Steve Poole is a Distinguished Senior Scientist and Chief Architect for Next Generation Platforms at Los Alamos National Laboratory (LANL). With over 38 years of experience, he is a leading expert in high-performance computing and parallel programming, and the founder of the OpenSHMEM specification widely used in HPC systems.

His work focuses on advanced algorithms and computing architectures supporting national security and scientific research.

► Senior Advisor & Liaison · Board Member
Salim Scafuto

Salim Scafuto is a cybersecurity leader with over 20 years of experience across product management, business development, sales engineering, and customer success.

As Chief Client Officer at StrikeReady, he leads global customer experience and strategic partnerships, and previously built the Cloud Services Platform business unit, achieving key growth milestones including Google ISV Connect status.

Advisors
► Advisor
Jon Monett

CIA with decades of service. Co-founder and director of Tellapure, LLC (since 2021), advancing 99.9% purification technologies for critical industries.

Prior CEO roles at O-Tech International (advanced tech exploration) and Telemus Solutions (info security for defense/intel). Co-founder of InfOsci LLC. Adds national-security-grade depth to LoB's solutions.

► Cloud · DevOps · Government & Enterprise · Fluent Arabic
Fadi Harake

Nuvitek's co-founder and COO since 2012. Excels in cloud integration, DevOps, and data infrastructure for government and enterprise — directly aligned with LoB's cybersecurity innovation.

Extensive AAC Inc. tenure as Sr. Technologist, infOsci LLC role, GMU education, and fluency in English, French, and Arabic enhance technical and multicultural contributions to LoB's DC-area operations.

Ready Today
Copyrighted EKI™ software — production hardened and ready for deployment
Drop-in PKI replacement — integrates without rip and replace

Mission Certainty Starts Here