New Cloakware® Report out now! Cloakware® Report, Edition 2: “Protect Your Software. Protect Your Business.”

Venn Diagram: What are the key business drivers for Software Protection - with examples

Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In the second edition of the Cloakware Report we suggest that there is more to software protection than this…

Your Evil Twin and You

Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from live processes have turned the use of digital twins into a must for the system owner and operator. But what is the twin in the hands of a potential hacker? Read Dave Belt’s new blog…