In the News

SC Magazine EBook on Application Security

Irene Abezgauz, product vice president at Dyadic, a New York-based firm which offers a software-only solution for protecting organizational secrets, agrees that all these challenges make protection of enterprise applications “a complex task.” Code that was tested for security today will be changed by next week or the next day, she says, so there’s a great need for ongoing security testing to constantly maintain a high level of security. In addition, with the growing lack of a network perimeter, the differentiation between friend and foe becomes much harder to identify, Abezguaz says.


Microsoft CEO Nadella unleashes security-first initiative

Dyadic Security co-founder and chief scientist Yehuda Lindell told that Microsoft’s security capabilities have “without a doubt” improved significantly in recent years.


Cybersecurity after the Paris attacks: Info-sharing in the spotlight

Dyadic Security co-founder and chief scientist Yehuda Lindell told there are “many things would make the job easier for law enforcement agencies,” including an ability to walk into anyone’s house at any time or search any car with or without cause. Lindell called the argument that private companies must provide access to unencrypted information to law enforcement and intelligence agencies “a joke,” since terrorists already encrypt their communication. “So you end up in a situation where the criminals encrypt their information and all of the rest of us do not,” he added.


Dyadic – Product of the Week

Powered by a multi-party computation (MPC)-based engine, Dyadic delivers powerful encryption, authentication and key protection. Organizations of all sizes can easily achieve effective, distributed protection of keys, credentials and data in any IT environment


Mozilla may reject SHA-1 certificates six months early

“This is a matter of risk management, and it is bad risk management,” Yehuda Lindell, chief scientist at Dyadic, told “In the end, we will all pay the price because of it,” he added.


Dyadic Protects Organizational Secrets and Sensitive Data with Comprehensive New Crypto Suite

Renowned cryptography professors transform multi-party computation research into technologically superior, easy-to-use encryption, authentication and distributed key protection solutions.

Page 23 of 25« First...10...2122232425