In the News

How cryptography enables online shopping, cloud tech, and the blockchain

Prof. Nigel Smart’s article, “How cryptography enables online shopping, cloud tech and the blockchain” is featured in The Next Web. He writes that “cryptography is the cement of the digital world, but it also has a long history that predates the digital era.”

Read More >>

New Runtime Encryption solutions emerging to fill “Encryption Gaps”

Professor Nigel Smart is interviewed by Patrick Nohe for Hashed Out by the SSL Magazine on the need new application logic before implementation of software-based encryption solutions, “all the technologies in the world aren’t going to take a C program and just run it. It needs to be converted to the cryptographic protocol.”

Read More >>

Avner Mor, CEO of Unbound Tech, uses ‘mathematical magic’ to protect organizations’ data

Avner Mor, Unbound’s CEO is interviewed by Stephanie Kanowitz at FierceCEO Magazine. “Avner Mor, CEO of Unbound Tech, is helping organizations hide their greatest asset – data – from hackers. The company programs software-defined cryptography tools based on multiparty computation, which Mor has dubbed ‘mathematical magic.'”

Read More >>

Unbound Technology’s Unbound Key Control Now Available in the Microsoft Azure Marketplace

We are excited to announce that Unbound Key Control (UKC) is available in the Microsoft Azure Marketplace. Now customers can purchase UKC directly from the Marketplace in a pay-as-you-go model to manage and control keys for their applications on Azure, providing a complete solution for the biggest pain points of protecting, controlling and managing cryptographic keys in the public cloud and in hybrid cloud environments.

Read More >>

Biometric security technology: Ready for corporate prime time?

Prof. Yehuda Lindell is interviewed by Mary Pratt on biometric security technology. “Yehuda Lindell, an associate professor in the computer science department at Bar-Ilan University in Israel and a leading cryptographic researcher, said enterprise cybersecurity leaders are right to hesitate before adopting biometrics platforms.”

Read More >>

Hybrid cloud security fundamentals: 4 things to know

Guy Peer, Unbound’s VP R&D is quoted in article for the The Enterprisers Project, which explores the core issues about hybrid cloud security that IT leaders should understand. Guy’s commentary includes: “there is no denying that hybrid cloud infrastructure is part of the new business reality, therefore, IT leaders must make hybrid cloud security a priority, if they haven’t already.” He is also quoted later on in the piece: “Most organizations will use a combination of on-premise with multiple cloud workloads on different public or private clouds. With this type of environment, perimeter security won’t cut it.”

Read More >>

Protecting IP In A Digitized Manufacturing Industry

An article by George Wainblat, Unbound’s Director of Product Management, is featured in Manufacturing Business Technology. “As manufacturing becomes increasingly connected, it’s vital that manufacturers adopt more modern security practices that go beyond a traditional perimeter security approach…encryption is essential to securing sensitive data such as IP within the network. By encrypting IP, and taking it a step further to secure the crypto keys, manufacturers can be confident that this valuable data is protected from hackers, even in the case of a breach and data exfiltration.”

Read More >>

Dyadic Rebrands As Unbound

Dyadic Security has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC).

Read More >>

How to take charge of data encryption in the cloud era

A contributed article by our VP Products, Oz Mishli, on the importance of data security in the cloud. “To implement cloud data security in an effective manner, the first step businesses should take is to assess what secrets are kept there that need protection. Secrets are essentially any data that if exposed would cause harm to the business.”

Read More >>

Dyadic Rebrands as Unbound: Reinventing the Future of Security and Privacy

Dyadic Security, the world leader in Software-Defined Cryptography (SDC), today announced it has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC). As a company, Unbound allows organizations to work with secrets without ever exposing them, ensuring digital assets are safe at all times. Now, previously out-of-reach digital services can be built while complying with the strictest security and privacy standards.

Read More >>

Dyadic Rebrands as Unbound: Reinventing the Future of Security and Privacy

Dyadic Security, the world leader in Software-Defined Cryptography (SDC), today announced it has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC). As a company, Unbound allows organizations to work with secrets without ever exposing them, ensuring digital assets are safe at all times. Now, previously out-of-reach digital services can be built while complying with the strictest security and privacy standards.

Read More >>

Cybersecurity in 2018: A roundup of predictions

Unbound Tech (formerly Dyadic Security) is mentioned in Charles McLlellan’s article on the ‘cybersecurity arms race’ of 2018, a never ending cycle between security professionals trying to outrun the ‘bad actors’ who find new ways to infiltrate networks and exfiltrate data, hold assets to ransom, or wreak havoc in other ways, for whatever reason.

Read More >>

38 Cybersecurity Predictions for 2018

Unbound Tech is mentioned in the Italian publication, Key4Biz, on cybersecurity trends for the upcoming year.

Read More >>

Dyadic 2018 Predictions: How Public Privacy Will Highlight a Need for Security in App Development

Guy Peer, Dyadic VP R&D and co-founder, was invited to write for VMBlog on his cybersecurity predictions, touching upon Guy’s thoughts on public privacy and the need for heightened application security in 2018. The article discusses IoT, mega-breaches and how security will become an integral part of the app development process.

Read More >>

The BIG List of 2018 Cyber Security Predictions From Experts Around the Globe

Guy Peer’s forecasts concerning cybersecurity predictions for 2018 were included in Medium, with Guy discussing what kind of cybersecurity news will appear in the news this year, “headlines will still be dominated by mega-breaches like the Equifax breach, as such events have a huge impact on business. Major breaches in which large groups of ‘non-technical’ people must understand why they were impacted by the breach, or why their privacy was violated, is essentially an emotional issue. Furthermore, issues such as legislation to ‘violate privacy’ impacts the rights of everyday citizens, and will also dominate headlines in 2018”.

Read More >>

Industry Reactions to Meltdown, Spectre Attacks: Feedback Friday

SecurityWeek included Professor Yehuda Lindell’s commentary about the Spectre Meltdown vulnerabilities in their latest, with Professor Lindell quoted as saying, “the important take-away from these attacks is very simple – computation leaks secrets! There has been a huge body of work showing that secret cryptographic keys and private information can be stolen by running software on the same machine and utilizing the properties of modern complex processors that don’t provide true separation between processes…”.

Read More >>

Top Security Challenges for 2018 – Part 1

Professor Nigel Smart’s prediction regarding fake news was included in part 1 of SC Magazine’s 2018 predictions round up: Top Security Challenges for 2018 – Part 1. Nigel’s prediction discussed how fake news will likely get worse in 2018 and that digital signatures and encryption on trusted recording devices could help combat the issue, “fake news is only going to get worse. Fake news became a major issue in 2017 and will likely get worse in 2018. In 2017, fake news was defined as a bend of the truth or an outright lie on behalf of the media. However, fake news can be looked at as an attack on authenticity in general. With CGI, photoshop and voice-over technology, it’s almost impossible to tell if a photo or video is real or fake. Solutions such as digital signatures and encryption enabled on trusted recording devices could help combat this issue, but the camera industry needs to include these options on equipment used by the news media in order for it to have an impact.”

Read More >>

Cybersecurity Predictions From ZeroFOX And Dyadic

Guy Peer, VP R&D and Dyadic co-founder, thinks IoT security will play a major role in 2018: “I think we will see more and more threats related to IoT devices. With the continuous spread of smart devices, from watches to cars to utilities, the landscape of attacks is becoming exponentially bigger. From attacking the device itself, using devices for targeted attacks on other resources (such as DDoS attacks) and maliciously collecting and revealing data collected from such devices in the cloud data center, the attack surface is becoming almost impossible to protect.”

Read More >>

2018 Security Predictions (Part 5)

Guy Peer, Dyadic VP R&D and co-founder is also featured in DZone’s predictions for 2018, with Guy discussing how security will integrate within developer tools, “in 2018, the developer-security movement will focus on changes in the infrastructure, security operations and underline development tools, which will narrow down the options to mistakenly damage application security. This will allow better application security without changing the development process or slowing down TTM. We should not expect developers to be security experts, nor should we slow down the development process. Instead, we’ll see security baked into developer tools to allow for rapid development, without violating application security.”

Read More >>

2018 DevOps Predictions – Part 1

Guy Peer, Dyadic VP R&D and co-founder is featured in DevopsDigest’s predictions for 2018, with Guy discussing how security will integrate within developer tools, “in 2018, the developer-security movement will focus on changes in the infrastructure, security operations and underline development tools, which will narrow down the options to mistakenly damage application security. This will allow better application security without changing the development process or slowing down TTM. We should not expect developers to be security experts, nor should we slow down the development process. Instead, we’ll see security baked into developer tools to allow for rapid development, without violating application security.”

Read More >>
Page 1 of 41234