The best way to keep your software secure is to place it into a safe and then bury it in your back garden… well not quite, but let me explain what I mean.
The best way to keep your software secure is to place it into a safe and then bury it in your back garden… well not quite, but let me explain what I mean.
Is your device protected by secure hardware? The answer might surprise you! In this blog, we take a deeper look into what secure hardware is, how commonplace it is in devices, why some manufactures might not include it, how reliable it is and some other possible security options that can be used instead.
The manufacturing industry already appreciates the cost savings and efficiency improvements that digital twins offer. With information about the design, operation, and maintenance of devices all in one place, the digital twin model facilitates everything from better...
In our very first Cloakable blog post, we discussed why whitebox cryptography is so important when developing software that needs to keep data and keys secure. Specifically, we discussed how software is an open book, with the ability to view and alter the internals...
There are hundreds of articles out there encouraging you to "secure" your software, and several tools that help you find and address security vulnerabilities in your software. No less an authority than CERT publishes a secure coding standard, including such excellent...
Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers. Whatever lies ahead, the real question is, are you ready for change? Read more about Cryptographic agility, or cryptoagility…
More and more security companies are including “white-box cryptography” in their product offerings. This is more than buzzword compliance; it’s a recognition that white-box attacks are real, and that the implementation of a cryptographic algorithm is as important as the algorithm itself.