In the News

Biometric security technology: Ready for corporate prime time?

Prof. Yehuda Lindell is interviewed by Mary Pratt on biometric security technology. “Yehuda Lindell, an associate professor in the computer science department at Bar-Ilan University in Israel and a leading cryptographic researcher, said enterprise cybersecurity leaders are right to hesitate before adopting biometrics platforms.”

Read More >>

Hybrid cloud security fundamentals: 4 things to know

Guy Peer, Unbound’s VP R&D is quoted in article for the The Enterprisers Project, which explores the core issues about hybrid cloud security that IT leaders should understand. Guy’s commentary includes: “there is no denying that hybrid cloud infrastructure is part of the new business reality, therefore, IT leaders must make hybrid cloud security a priority, if they haven’t already.” He is also quoted later on in the piece: “Most organizations will use a combination of on-premise with multiple cloud workloads on different public or private clouds. With this type of environment, perimeter security won’t cut it.”

Read More >>

Protecting IP In A Digitized Manufacturing Industry

An article by George Wainblat, Unbound’s Director of Product Management, is featured in Manufacturing Business Technology. “As manufacturing becomes increasingly connected, it’s vital that manufacturers adopt more modern security practices that go beyond a traditional perimeter security approach…encryption is essential to securing sensitive data such as IP within the network. By encrypting IP, and taking it a step further to secure the crypto keys, manufacturers can be confident that this valuable data is protected from hackers, even in the case of a breach and data exfiltration.”

Read More >>

Dyadic Rebrands As Unbound

Dyadic Security has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC).

Read More >>

How to take charge of data encryption in the cloud era

A contributed article by our VP Products, Oz Mishli, on the importance of data security in the cloud. “To implement cloud data security in an effective manner, the first step businesses should take is to assess what secrets are kept there that need protection. Secrets are essentially any data that if exposed would cause harm to the business.”

Read More >>

Dyadic Rebrands as Unbound: Reinventing the Future of Security and Privacy

Dyadic Security, the world leader in Software-Defined Cryptography (SDC), today announced it has rebranded as Unbound Technology. Stemming from the mathematical term “unbounded” which refers to something that is not confined to certain parameters – reflecting the company’s unique approach to security and privacy, which is based on multiparty computation (MPC). As a company, Unbound allows organizations to work with secrets without ever exposing them, ensuring digital assets are safe at all times. Now, previously out-of-reach digital services can be built while complying with the strictest security and privacy standards.

Read More >>
Page 5 of 15« First...34567...10...Last »