In the News

Dyadic Rebrands as Unbound: Reinventing the Future of Security and Privacy

Dyadic Security, the world leader in Software-Defined Cryptography (SDC), today announced it has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC). As a company, Unbound allows organizations to work with secrets without ever exposing them, ensuring digital assets are safe at all times. Now, previously out-of-reach digital services can be built while complying with the strictest security and privacy standards.

Read More >>

Dyadic Rebrands as Unbound: Reinventing the Future of Security and Privacy

Dyadic Security, the world leader in Software-Defined Cryptography (SDC), today announced it has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC). As a company, Unbound allows organizations to work with secrets without ever exposing them, ensuring digital assets are safe at all times. Now, previously out-of-reach digital services can be built while complying with the strictest security and privacy standards.

Read More >>

Cybersecurity in 2018: A roundup of predictions

Unbound Tech (formerly Dyadic Security) is mentioned in Charles McLlellan’s article on the ‘cybersecurity arms race’ of 2018, a never ending cycle between security professionals trying to outrun the ‘bad actors’ who find new ways to infiltrate networks and exfiltrate data, hold assets to ransom, or wreak havoc in other ways, for whatever reason.

Read More >>

38 Cybersecurity Predictions for 2018

Unbound Tech is mentioned in the Italian publication, Key4Biz, on cybersecurity trends for the upcoming year.

Read More >>

Dyadic 2018 Predictions: How Public Privacy Will Highlight a Need for Security in App Development

Guy Peer, Dyadic VP R&D and co-founder, was invited to write for VMBlog on his cybersecurity predictions, touching upon Guy’s thoughts on public privacy and the need for heightened application security in 2018. The article discusses IoT, mega-breaches and how security will become an integral part of the app development process.

Read More >>

The BIG List of 2018 Cyber Security Predictions From Experts Around the Globe

Guy Peer’s forecasts concerning cybersecurity predictions for 2018 were included in Medium, with Guy discussing what kind of cybersecurity news will appear in the news this year, “headlines will still be dominated by mega-breaches like the Equifax breach, as such events have a huge impact on business. Major breaches in which large groups of ‘non-technical’ people must understand why they were impacted by the breach, or why their privacy was violated, is essentially an emotional issue. Furthermore, issues such as legislation to ‘violate privacy’ impacts the rights of everyday citizens, and will also dominate headlines in 2018”.

Read More >>

Industry Reactions to Meltdown, Spectre Attacks: Feedback Friday

SecurityWeek included Professor Yehuda Lindell’s commentary about the Spectre Meltdown vulnerabilities in their latest, with Professor Lindell quoted as saying, “the important take-away from these attacks is very simple – computation leaks secrets! There has been a huge body of work showing that secret cryptographic keys and private information can be stolen by running software on the same machine and utilizing the properties of modern complex processors that don’t provide true separation between processes…”.

Read More >>

Top Security Challenges for 2018 – Part 1

Professor Nigel Smart’s prediction regarding fake news was included in part 1 of SC Magazine’s 2018 predictions round up: Top Security Challenges for 2018 – Part 1. Nigel’s prediction discussed how fake news will likely get worse in 2018 and that digital signatures and encryption on trusted recording devices could help combat the issue, “fake news is only going to get worse. Fake news became a major issue in 2017 and will likely get worse in 2018. In 2017, fake news was defined as a bend of the truth or an outright lie on behalf of the media. However, fake news can be looked at as an attack on authenticity in general. With CGI, photoshop and voice-over technology, it’s almost impossible to tell if a photo or video is real or fake. Solutions such as digital signatures and encryption enabled on trusted recording devices could help combat this issue, but the camera industry needs to include these options on equipment used by the news media in order for it to have an impact.”

Read More >>

Cybersecurity Predictions From ZeroFOX And Dyadic

Guy Peer, VP R&D and Dyadic co-founder, thinks IoT security will play a major role in 2018: “I think we will see more and more threats related to IoT devices. With the continuous spread of smart devices, from watches to cars to utilities, the landscape of attacks is becoming exponentially bigger. From attacking the device itself, using devices for targeted attacks on other resources (such as DDoS attacks) and maliciously collecting and revealing data collected from such devices in the cloud data center, the attack surface is becoming almost impossible to protect.”

Read More >>

2018 Security Predictions (Part 5)

Guy Peer, Dyadic VP R&D and co-founder is also featured in DZone’s predictions for 2018, with Guy discussing how security will integrate within developer tools, “in 2018, the developer-security movement will focus on changes in the infrastructure, security operations and underline development tools, which will narrow down the options to mistakenly damage application security. This will allow better application security without changing the development process or slowing down TTM. We should not expect developers to be security experts, nor should we slow down the development process. Instead, we’ll see security baked into developer tools to allow for rapid development, without violating application security.”

Read More >>

2018 DevOps Predictions – Part 1

Guy Peer, Dyadic VP R&D and co-founder is featured in DevopsDigest’s predictions for 2018, with Guy discussing how security will integrate within developer tools, “in 2018, the developer-security movement will focus on changes in the infrastructure, security operations and underline development tools, which will narrow down the options to mistakenly damage application security. This will allow better application security without changing the development process or slowing down TTM. We should not expect developers to be security experts, nor should we slow down the development process. Instead, we’ll see security baked into developer tools to allow for rapid development, without violating application security.”

Read More >>

Protecting Your Company’s Secrets in the Cloud-Native Age

Our Direct of Product Management, George Wainblat, discusses the importance of safeguarding encryption keys in DevopsDigest. Keys that aren’t protected could result in business implications that could potentially be costly and even devastating.

Read More >>

Cyberthieves loot tens of millions in bitcoin from NiceHash cryptocurrency marketplace

Guy Peer, Dyadic VP & co-founder comments on the Nicehash breach, “unlike classic attacks where hackers get a hold of sensitive data which can lead to fraudulent activity, the actual value of the breach is usually vague and is constructed from fines, PR issues, etc. This is not the case for cryptocurrency hacks, or blockchain in general, where the attack can be immediately evaluated in exact money value. That’s because hacking into a cryptocurrency system and being able to use the crypto secrets – private keys, in technical terms – is exactly like breaking into a bank safe and carrying out the gold.”

Read More >>

2017 Security Surprises (Part 2)

Guy Peer, Dyadic VP of R&D and co-founder, was quoted by Tom Smith for Dzone. Guy talks about the ROCA vulnerability that occurred earlier this year, and how “the vulnerability has far-reaching ramifications. On a deeper level, crypto, as we know it, is fragile, and we should think about how to better implement crypto standards in the wake of these types of security events.”

Read More >>

60 Cybersecurity Predictions For 2018

Professor Nigel Smart was quoted in Gil Press’ predictions round up in Forbes regarding fake news, stating that “fake news became a major issue in 2017 and will likely get worse in 2018. With CGI, photoshop and voice-over technology, it’s almost impossible to tell if a photo or video is real or fake. Solutions such as digital signatures and encryption enabled on trusted recording devices could help combat this issue, but the camera industry needs to include these options on equipment used by the news media.”

Read More >>

Uber slammed by security experts over data breach that exposed data on 57 million customers

Guy Pe’er, Dyadic VP of R&D and co-founder responds to the Uber data breach and says that “it seems like in many of the major hacks, attackers are just entering through the main door, where even technology giants such as Uber are not exercising simple security practices. Simple measures such as strong authentication, credentials protection and encryption would have blocked such an attack and many other of the recent breaches in the news.”

Read More >>

What a 100-year-old idea can teach us about cybersecurity

The ability to finally achieve true, cost-effective security, once and for all, is finally within our grasp, with Post Quantum Cyber Security solutions available from companies such as BitMint, Cambridge Quantum, China Quantum Technologies, Crypta Labs, Dyadic, ID Quantique and Post Quantum.

Read More >>

Dyadic Security Hires New Vice President of North American Sales

Dyadic Security, the world leader in Software-Defined Cryptography (SDC), today announced the hiring of Tasso Mangafas as vice president of sales, North America. Mangafas is a seasoned security sales executive with a proven history of success and a 13-year industry track record in cybersecurity. As a senior leader of Dyadic’s expanding sales force, Mangafas will spearhead the expansion and growth of Dyadic’s North American footprint.

Read More >>

How Dyadic Secures Keys on All Devices and Platforms

Thanks to Oz Mishli, V.P. of Products at Dyadic for sharing with me how they provide a virtual hardware security module (vHSM) for all devices and platforms, securing cryptographic in the compute environment whether it’s racks for data centers and cloud or end-point devices.

Read More >>

Pumpkin-Spiced Cybersecurity: October is National Cyber Security Awareness Month

Repeated reminders of the cybersecurity boogie man, ways to protect personally identifiable information, and advertisements for products to fight hackers, can lead to security fatigue, which in turn may lead to risky computing behavior. “Rather than combating or alleviating security fatigue, organizations should focus on how to take the security burden off of employees as much as possible,” said Guy Peer, vice president of research and development and co-founder at Dyadic Security.

Read More >>
Page 2 of 41234