In the News

Israeli cyber-security firms seek to bolster defenses of UK banks, insurers

UK banks, insurers and telecom companies will be looking to Israel for cyber-security solutions this week, as part of an effort by the British government to increase the protection of companies and institutions from cyberattacks. The program will take place in London on 11-14 September, and is set to include pitching and networking events, tours to tech companies, meetings with potential investors and government officials.

Read More >>

Dyadic Security Raises $12 Million to Help Enterprises Virtualize Crypto With Hardware-Level Security Standards

Investment round led by Goldman Sachs Principal Strategic Investments, along with Citi Ventures and Eric Schmidt’s Innovation Endeavors. Dyadic Security (Dyadic), the world leader in Software-Defined Cryptography (SDC), announced today the completion of a $12 million Series B funding round led by Goldman Sachs Principal Strategic Investments, Citi Ventures and Eric Schmidt’s Innovation Endeavors. The funding round will be used to expand Dyadic’s sales and marketing operations in North America. As part of the investment, Innovation Endeavors’ Yuval Shachar has been named Chairman of the Dyadic Board of Directors. “Dyadic has changed the game for financial institutions and enterprise companies in how they protect sensitive data assets,” said Avner Mor, CEO and Co-founder of Dyadic. “Based on decades of research in Multiparty Computation (MPC), our MPC-based technology helps our customers overcome the tremendous security and compliance challenges they face as they make the transition to a cloud-based infrastructure.”

Read More >>

10 Powerful Examples of Artificial Intelligence in Use Today

In a conversation with Nigel Smart, founder of Dyadic Security and Vice President of the International Association of Cryptologic Research, a Professor of Cryptology at the University of Bristol and an ERC Advanced Grant holder, he tells me that quantum computers could still be about 5 years out. Smart tells me that: “…all of the world’s digital security is essentially broken. The internet will not be secure, as we rely on algorithms which are broken by quantum computers to secure our connections to web sites, download emails and everything else. Even updates to phones, and downloading applications from App stores will be broken and unreliable. Banking transactions via chip-and-PIN could [also] be rendered insecure (depending on exactly how the system is implemented in each country).

Read More >>

5 Key Ingredients for Corporate Innovation

Avner Mor, CEO of Unbound Tech, discusses the five crucial ingredients that senior management should use to help their innovation projects succeed.

Read More >>

FBI, Apple battle may leave lasting legacy

“Cryptography exists,” said Yehuda Lindell, co-founder and chief scientist at Dyadic Security and author of the widely-used textbook “Introduction of Modern Cryptography.” “You can open my textbook and read it and now you will know how to write your own code and protect yourself.”

Read More >>

Biometrically challenged: three-factor authentication systems too weak for web banking

Also keen to voice an opinion on this subject was Oz Mishli in his role as VP of product at Dyadic Security. Mishli spoke to SC to say that biometrics, like any other security solution, is not a silver bullet. “In many cases it does offer considerable UX and security benefits over the traditional passwords, particularly for mobile banking.”

Read More >>

DROWN Security Flaw Is Bad, But It’s Not Heartbleed or OpenSSL’s Fault

Yehuda Lindell, founder of security company Dyadic, perhaps put it best. “This is not another heartbleed in the sense that heartbleed was incredibly easy to exploit,” he told The VAR Guy, adding that DROWN “is a very serious attack, but can be prevented quite easily.”

Read More >>

Report: 3.5 Million HTTPS Servers Vulnerable to DROWN

DROWN is a serious attack, but it can be prevented quite easily using measures that were recommended to server operators and system administrators a long time ago, according to Yehuda Lindell, chief scientist at Dyadic. That involves disabling SSLv2 and even SSL v3.

Read More >>

What you need to know about Apple’s fight with the FBI

Cryptography researcher Dr. Yehuda Lindell also believes it’s possible to get into the phone, but it could be expensive and leave Apple open to security risks. “It may also involve finding new flaws to exploit in the current system,” he told Engadget. “The problem is that once this is done, then it can be used again. In actuality, the mere knowledge that it was done will make it easier for others to find out how,” he added.

Read More >>

Apple could break into its iPhones in an afternoon, say experts

Cryptography expert and co-founder of Dyadic Security, Yehuda Lindell, speaks to USA Today on the how long it would take the FBI to crack a password if the self-destruct mechanism were disabled, “If it were four digits, that’s about 10,000 possibilities and you only need seconds to get in. If it’s six digits, which is one million possible combinations, maybe it’s a few minutes.”

Read More >>

4 Essential Startup Steps You Shouldn’t Overlook

Entrepreneurship is one of the most rewarding career choices you can make, but it’s also one of the most difficult. Dyadic CEO, Avner Mor, shares insights to help would-be entrepreneurs stay on the right path.

Read More >>

Want to solve GCHQ’s Christmas puzzle? Team up

Dyadic co-founder, Dr. Nigel Smart, talks about the GCHQ puzzle was a way to raise the profile of the agency’s cybersecurity work while trying to recruit new cryptological minds.

Read More >>

Think You’re More Secure than Instagram?

A Cyber Security Q&A with Dyadic Chief Scientist Yehuda Lindell. IT Briefcase sat down with Dr. Yehuda Lindellto focus on two of Instagram’s recently reported vulnerabilities that can be found in nearly every company today.

Read More >>

GCHQ-developed phone security ‘open to surveillance’

Dyadic co-founder, Dr. Nigel Smart, weighs in on the new security protocal being used to encrypt VOIP calls.

Read More >>

The Changing Face Of Encryption: What You Need To Know Now

Yehuda Lindell, Dyadic Security co-founder and chief scientist, contributes an article on the state of encryption today and offers five tips based on up-to-date best practices on encrypting data in your organisation.

Read More >>

Security researchers prepare for the ‘New normal’ post-CISA

Security researchers are preparing for the new normal that they will soon face in light of the cybersecurity legislation that was signed by President Obama last week. Now, researchers are bracing for the new challenge that an environment of automated information sharing would bring to an already challenging role.

Read More >>

Cybersecurity Checklist for Online Retailers This Holiday Season

Dyadic CEO offers an invaluable security checklist to retailers to help promote a safe and confident shopping experience for their consumers and to preserve revenue and reputation for their brands.

Read More >>

Librarians join privacy groups, as industry sources react to cybersecurity draft

Yehuda Lindell, Dyadic Security co-founder and chief scientist, warned about the prospect of government backdoors and de-encrypting technologies. He warned that once back doors are created for use by government authorities, it is much easier for hackers to access sensitive information by hacking the key to back doors.

Read More >>

Crytographic Key Reuse Exposed, Leaving Users at Risk

Using hardcoded private keys is a security disaster, according to Dr. Yehuda Lindell, co-founder and chief scientist at Dyadic. Lindell sees a number of reasons why the private keys may have been left exposed and reused by multiple vendors.

Read More >>

SC Magazine EBook on Application Security

Irene Abezgauz, product vice president at Dyadic, a New York-based firm which offers a software-only solution for protecting organizational secrets, agrees that all these challenges make protection of enterprise applications “a complex task.” Code that was tested for security today will be changed by next week or the next day, she says, so there’s a great need for ongoing security testing to constantly maintain a high level of security. In addition, with the growing lack of a network perimeter, the differentiation between friend and foe becomes much harder to identify, Abezguaz says.

Read More >>
Page 3 of 41234