In the News

Podcast: Applying Secure Multiparty Computation Technology

In an interview with Bank Info Security, Unbound Tech’s Prof. Yehuda Lindell says that secure multiparty computation technology enables users to carry out computation on private data while it remains encrypted, and one of the main applications is for protecting cryptographic keys.

Read More >>

Ever–growing need for privacy results in a boom for multi-party computing adoption

Unbound Tech’s Prof. Nigel Smart writes about securing data at rest, data in transit– and new methodologies to secure data in processing.

Read More >>

Unbound Releases Open Source Blockchain-Crypto-mpc Library for Blockchain Developers

Unbound’s blockchain-crypto-mpc library is available as open source on Git Hub. It’s an open source library for blockchain and crypto assets that protects cryptographic keys using the company’s MPC-based technology used by the Fortune 500.

Read More >>

Keeping Our Data Safe: the Role of Multiparty Computation

How can we use such data while still respecting people’s privacy? Three ERC funded researchers, including Unbound Tech’s Yehuda Lindell and Nigel Smart are exploring how multiparty computation can work to access the contents of different databases without having to compromise privacy.

Read More >>

Unbound Tech Wins Prime Minister’s Award for Israeli Innovation

Unbound Tech is one of three winners of the prestigious Prime Minister’s Award for Israeli Innovation for its work on cybersecurity technology that protects cryptographic keys and passwords.

Read More >>

Avner Mor, CEO & Co-Founder of Unbound, at Hong Kong Fintech Week

HKFintechWeek 2018 brings you this sentence, “a trust platform for secrets.” Now that sounds like something. Unbound’s CEO Avner Mor tells you how the company provides that platform.

Read More >>

Unbound Launches First MPC-Based Crypto Asset Security Platform That Cures the Crypto Custody Problem

Unbound introduces the first bank-level security platform for crypto assets. The blockchain key management solution leverages Unbound’s Distributed Trust Platform to create and use fragmented private keys without ever unifying them – delivering utmost security, speed and customer experience.

Read More >>

Prof. Yehuda Lindell on the Cyberwire Podcast

Prof. Yehuda Lindell speaks to the Cyberwire Podcast on the Foreshadow vulnerability.

Read More >>

Foreshadow, SGX & the Failure of Trusted Execution

Prof. Yehuda Lindell’s article on challenges of trust in today’s computing environments and how to address them was featured in Dark Reading. He delves into new vulnerabilities: “Trusted execution environments are said to provide a hardware-protected enclave that runs soft ware and cannot be accessed externally, but recent developments show they fall far short.”

Read More >>

Cryptographic agility is key to post-quantum security

Unbound Chief Scientist & Co-Founder, Prof. Yehuda Lindell was interviewed by Warwick Ashton of Computer Weekly on the need for organizations to achieve cryptographic agility to ensure data is secure for decades to come “organisations that need to ensure that data is kept secure for the next 20 to 30 years should be working to ensure that their systems are cryptographically agile, so they are ready to make that switch as soon as it is necessary,” said Lindell.

Read More >>

Unbound Tech Listed in Five Gartner Hype Cycle Reports

Unbound Tech, the world leader in software-defined cryptography, announced today it was listed as a Sample Vendor in five July 2018 Gartner Hype Cycle Reports including Blockchain Technologies, 2018 (Multiparty Computing), Cloud Security, 2018*(KMaaS), Data Security, 2018* (Multiparty Computing and KMaaS), Identity and Access Management Technologies, 2018* (Multiparty Computing), Privacy, 2018*(Multiparty Computing).

Read More >>

How cryptography enables online shopping, cloud tech, and the blockchain

Prof. Nigel Smart’s article, “How cryptography enables online shopping, cloud tech and the blockchain” is featured in The Next Web. He writes that “cryptography is the cement of the digital world, but it also has a long history that predates the digital era.”

Read More >>

New Runtime Encryption solutions emerging to fill “Encryption Gaps”

Professor Nigel Smart is interviewed by Patrick Nohe for Hashed Out by the SSL Magazine on the need new application logic before implementation of software-based encryption solutions, “all the technologies in the world aren’t going to take a C program and just run it. It needs to be converted to the cryptographic protocol.”

Read More >>

Avner Mor, CEO of Unbound Tech, uses ‘mathematical magic’ to protect organizations’ data

Avner Mor, Unbound’s CEO is interviewed by Stephanie Kanowitz at FierceCEO Magazine. “Avner Mor, CEO of Unbound Tech, is helping organizations hide their greatest asset – data – from hackers. The company programs software-defined cryptography tools based on multiparty computation, which Mor has dubbed ‘mathematical magic.'”

Read More >>

Unbound Technology’s Unbound Key Control Now Available in the Microsoft Azure Marketplace

We are excited to announce that Unbound Key Control (UKC) is available in the Microsoft Azure Marketplace. Now customers can purchase UKC directly from the Marketplace in a pay-as-you-go model to manage and control keys for their applications on Azure, providing a complete solution for the biggest pain points of protecting, controlling and managing cryptographic keys in the public cloud and in hybrid cloud environments.

Read More >>

Biometric security technology: Ready for corporate prime time?

Prof. Yehuda Lindell is interviewed by Mary Pratt on biometric security technology. “Yehuda Lindell, an associate professor in the computer science department at Bar-Ilan University in Israel and a leading cryptographic researcher, said enterprise cybersecurity leaders are right to hesitate before adopting biometrics platforms.”

Read More >>

Hybrid cloud security fundamentals: 4 things to know

Guy Peer, Unbound’s VP R&D is quoted in article for the The Enterprisers Project, which explores the core issues about hybrid cloud security that IT leaders should understand. Guy’s commentary includes: “there is no denying that hybrid cloud infrastructure is part of the new business reality, therefore, IT leaders must make hybrid cloud security a priority, if they haven’t already.” He is also quoted later on in the piece: “Most organizations will use a combination of on-premise with multiple cloud workloads on different public or private clouds. With this type of environment, perimeter security won’t cut it.”

Read More >>

Protecting IP In A Digitized Manufacturing Industry

An article by George Wainblat, Unbound’s Director of Product Management, is featured in Manufacturing Business Technology. “As manufacturing becomes increasingly connected, it’s vital that manufacturers adopt more modern security practices that go beyond a traditional perimeter security approach…encryption is essential to securing sensitive data such as IP within the network. By encrypting IP, and taking it a step further to secure the crypto keys, manufacturers can be confident that this valuable data is protected from hackers, even in the case of a breach and data exfiltration.”

Read More >>

Dyadic Rebrands As Unbound

Dyadic Security has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC).

Read More >>

How to take charge of data encryption in the cloud era

A contributed article by our VP Products, Oz Mishli, on the importance of data security in the cloud. “To implement cloud data security in an effective manner, the first step businesses should take is to assess what secrets are kept there that need protection. Secrets are essentially any data that if exposed would cause harm to the business.”

Read More >>
Page 1 of 41234