Is your device protected by secure hardware? The answer might surprise you! In this blog, we take a deeper look into what secure hardware is, how commonplace it is in devices, why some manufactures might not include it, how reliable it is and some other possible security options that can be used instead.
The manufacturing industry already appreciates the cost savings and efficiency improvements that digital twins offer. With information about the design, operation, and maintenance of devices all in one place, the digital twin model facilitates everything […]
In our very first Cloakable blog post, we discussed why whitebox cryptography is so important when developing software that needs to keep data and keys secure. Specifically, we discussed how software is an open book, with […]
There are hundreds of articles out there encouraging you to “secure” your software, and several tools that help you find and address security vulnerabilities in your software. No less an authority than CERT publishes a secure […]
Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers. Whatever lies ahead, the real question is, are you ready for change? Read more about Cryptographic agility, or cryptoagility…
More and more security companies are including “white-box cryptography” in their product offerings. This is more than buzzword compliance; it’s a recognition that white-box attacks are real, and that the implementation of a cryptographic algorithm is as important as the algorithm itself.