Thoughts on Software Trustworthiness Best Practices
Software is the invisible fabric that enables the world to interact, transact, and function....
Read MoreSoftware is the invisible fabric that enables the world to interact, transact, and function....
Read MoreIn our very first Cloakable blog post, we discussed why whitebox cryptography is so important when...
Read MoreA light-hearted animation explains some of the key features of good software protection…...
Read MoreThe Cryptographic community has been watching the development of Quantum Computing for many years...
Read MoreSome of you will remember the Target and Home Depot cyberattacks in 2013 & 2014, which resulted in $202 million (Sruthi Ramakrishnan, 2017) and $134.5 million USD (Roberts, 2017) of damages respectively. In this blog article, let’s examine these and other infamous hacks in detail to glean important lessons about system and application security.
Read More