In the News

Prof. Yehuda Lindell on the Cyberwire Podcast

Prof. Yehuda Lindell speaks to the Cyberwire Podcast on the Foreshadow vulnerability.

Read More >>

Foreshadow, SGX & the Failure of Trusted Execution

Prof. Yehuda Lindell’s article on challenges of trust in today’s computing environments and how to address them was featured in Dark Reading. He delves into new vulnerabilities: “Trusted execution environments are said to provide a hardware-protected enclave that runs soft ware and cannot be accessed externally, but recent developments show they fall far short.”

Read More >>

Cryptographic agility is key to post-quantum security

Unbound Chief Scientist & Co-Founder, Prof. Yehuda Lindell was interviewed by Warwick Ashton of Computer Weekly on the need for organizations to achieve cryptographic agility to ensure data is secure for decades to come “organisations that need to ensure that data is kept secure for the next 20 to 30 years should be working to ensure that their systems are cryptographically agile, so they are ready to make that switch as soon as it is necessary,” said Lindell.

Read More >>

Unbound Tech Listed in Five Gartner Hype Cycle Reports

Unbound Tech, the world leader in software-defined cryptography, announced today it was listed as a Sample Vendor in five July 2018 Gartner Hype Cycle Reports including Blockchain Technologies, 2018 (Multiparty Computing), Cloud Security, 2018*(KMaaS), Data Security, 2018* (Multiparty Computing and KMaaS), Identity and Access Management Technologies, 2018* (Multiparty Computing), Privacy, 2018*(Multiparty Computing).

Read More >>

How cryptography enables online shopping, cloud tech, and the blockchain

Prof. Nigel Smart’s article, “How cryptography enables online shopping, cloud tech and the blockchain” is featured in The Next Web. He writes that “cryptography is the cement of the digital world, but it also has a long history that predates the digital era.”

Read More >>

New Runtime Encryption solutions emerging to fill “Encryption Gaps”

Professor Nigel Smart is interviewed by Patrick Nohe for Hashed Out by the SSL Magazine on the need new application logic before implementation of software-based encryption solutions, “all the technologies in the world aren’t going to take a C program and just run it. It needs to be converted to the cryptographic protocol.”

Read More >>

Avner Mor, CEO of Unbound Tech, uses ‘mathematical magic’ to protect organizations’ data

Avner Mor, Unbound’s CEO is interviewed by Stephanie Kanowitz at FierceCEO Magazine. “Avner Mor, CEO of Unbound Tech, is helping organizations hide their greatest asset – data – from hackers. The company programs software-defined cryptography tools based on multiparty computation, which Mor has dubbed ‘mathematical magic.'”

Read More >>

Unbound Technology’s Unbound Key Control Now Available in the Microsoft Azure Marketplace

We are excited to announce that Unbound Key Control (UKC) is available in the Microsoft Azure Marketplace. Now customers can purchase UKC directly from the Marketplace in a pay-as-you-go model to manage and control keys for their applications on Azure, providing a complete solution for the biggest pain points of protecting, controlling and managing cryptographic keys in the public cloud and in hybrid cloud environments.

Read More >>

Biometric security technology: Ready for corporate prime time?

Prof. Yehuda Lindell is interviewed by Mary Pratt on biometric security technology. “Yehuda Lindell, an associate professor in the computer science department at Bar-Ilan University in Israel and a leading cryptographic researcher, said enterprise cybersecurity leaders are right to hesitate before adopting biometrics platforms.”

Read More >>

Hybrid cloud security fundamentals: 4 things to know

Guy Peer, Unbound’s VP R&D is quoted in article for the The Enterprisers Project, which explores the core issues about hybrid cloud security that IT leaders should understand. Guy’s commentary includes: “there is no denying that hybrid cloud infrastructure is part of the new business reality, therefore, IT leaders must make hybrid cloud security a priority, if they haven’t already.” He is also quoted later on in the piece: “Most organizations will use a combination of on-premise with multiple cloud workloads on different public or private clouds. With this type of environment, perimeter security won’t cut it.”

Read More >>

Protecting IP In A Digitized Manufacturing Industry

An article by George Wainblat, Unbound’s Director of Product Management, is featured in Manufacturing Business Technology. “As manufacturing becomes increasingly connected, it’s vital that manufacturers adopt more modern security practices that go beyond a traditional perimeter security approach…encryption is essential to securing sensitive data such as IP within the network. By encrypting IP, and taking it a step further to secure the crypto keys, manufacturers can be confident that this valuable data is protected from hackers, even in the case of a breach and data exfiltration.”

Read More >>

Dyadic Rebrands As Unbound

Dyadic Security has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC).

Read More >>

How to take charge of data encryption in the cloud era

A contributed article by our VP Products, Oz Mishli, on the importance of data security in the cloud. “To implement cloud data security in an effective manner, the first step businesses should take is to assess what secrets are kept there that need protection. Secrets are essentially any data that if exposed would cause harm to the business.”

Read More >>

Dyadic Rebrands as Unbound: Reinventing the Future of Security and Privacy

Dyadic Security, the world leader in Software-Defined Cryptography (SDC), today announced it has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC). As a company, Unbound allows organizations to work with secrets without ever exposing them, ensuring digital assets are safe at all times. Now, previously out-of-reach digital services can be built while complying with the strictest security and privacy standards.

Read More >>

Dyadic Rebrands as Unbound: Reinventing the Future of Security and Privacy

Dyadic Security, the world leader in Software-Defined Cryptography (SDC), today announced it has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC). As a company, Unbound allows organizations to work with secrets without ever exposing them, ensuring digital assets are safe at all times. Now, previously out-of-reach digital services can be built while complying with the strictest security and privacy standards.

Read More >>

Cybersecurity in 2018: A roundup of predictions

Unbound Tech (formerly Dyadic Security) is mentioned in Charles McLlellan’s article on the ‘cybersecurity arms race’ of 2018, a never ending cycle between security professionals trying to outrun the ‘bad actors’ who find new ways to infiltrate networks and exfiltrate data, hold assets to ransom, or wreak havoc in other ways, for whatever reason.

Read More >>

38 Cybersecurity Predictions for 2018

Unbound Tech is mentioned in the Italian publication, Key4Biz, on cybersecurity trends for the upcoming year.

Read More >>

Dyadic 2018 Predictions: How Public Privacy Will Highlight a Need for Security in App Development

Guy Peer, Dyadic VP R&D and co-founder, was invited to write for VMBlog on his cybersecurity predictions, touching upon Guy’s thoughts on public privacy and the need for heightened application security in 2018. The article discusses IoT, mega-breaches and how security will become an integral part of the app development process.

Read More >>

The BIG List of 2018 Cyber Security Predictions From Experts Around the Globe

Guy Peer’s forecasts concerning cybersecurity predictions for 2018 were included in Medium, with Guy discussing what kind of cybersecurity news will appear in the news this year, “headlines will still be dominated by mega-breaches like the Equifax breach, as such events have a huge impact on business. Major breaches in which large groups of ‘non-technical’ people must understand why they were impacted by the breach, or why their privacy was violated, is essentially an emotional issue. Furthermore, issues such as legislation to ‘violate privacy’ impacts the rights of everyday citizens, and will also dominate headlines in 2018”.

Read More >>

Industry Reactions to Meltdown, Spectre Attacks: Feedback Friday

SecurityWeek included Professor Yehuda Lindell’s commentary about the Spectre Meltdown vulnerabilities in their latest, with Professor Lindell quoted as saying, “the important take-away from these attacks is very simple – computation leaks secrets! There has been a huge body of work showing that secret cryptographic keys and private information can be stolen by running software on the same machine and utilizing the properties of modern complex processors that don’t provide true separation between processes…”.

Read More >>
Page 1 of 41234