Cloakable Tech Blog

Technical topics in the cybersecurity space

  • When Twins Go Bad — Model Poisoning Attacks on Digital Twins

    When Twins Go Bad — Model Poisoning Attacks on Digital Twins

    The manufacturing industry already appreciates the cost savings and efficiency improvements that digital twins offer. With information about the design, operation, and maintenance of devices all...

    Read Article
  • Cybersecurity and Additive Manufacturing: Tell Me Something I Don’t Already Know

    Cybersecurity and Additive Manufacturing: Tell Me Something I Don’t Already Know

    Pick a cybersecurity survey, any survey from any provider. Go ahead. I’ll wait. That survey you picked is going to tell you that: Despite your best efforts, your business is hopelessly exposed....

    Read Article
  • Critical Infrastructure Security and Resilience Month – Should It Be Every Month?

    Critical Infrastructure Security and Resilience Month – Should It Be Every Month?

    I had the privilege to attend an industry event in September 2019, where William Evanina, Director of US National Counterintelligence and Security Center (NCSC), was speaking to some of IIoT’s...

    Read Article
  • What Would Privacy-Preserving ML Look Like?

    What Would Privacy-Preserving ML Look Like?

    Artificial intelligence (AI) and machine learning (ML) have made huge gains over the last few years, thanks to the vast amount of data available and to the gains made in raw hardware processing...

    Read Article
  • Whitebox Attacks… on Hardware?

    Whitebox Attacks… on Hardware?

    In our very first Cloakable blog post, we discussed why whitebox cryptography is so important when developing software that needs to keep data and keys secure.  Specifically, we discussed how...

    Read Article
  • On Booth Duty at Black Hat

    On Booth Duty at Black Hat

    Our team is back from Las Vegas where Black Hat USA 2019 was held two weeks ago. The main themes this year included IoT, application security, and the role of humans in security and privacy. […]

    Read Article
  • Humans Front and Center at the Connected Manufacturing Forum

    Humans Front and Center at the Connected Manufacturing Forum

    Last week, members of our IoT Security Market Unit attended the Connected Manufacturing Forum in Austin, Texas. The two-day event focused on how to move the dial around Industry 4.0, and how to go...

    Read Article
  • Industry 4.0: How cybersecurity threats are everyone’s business

    Industry 4.0: How cybersecurity threats are everyone’s business

    A big part of Industry 4.0 requires the successful integration of the supply chain into the manufacturing process.  In the ideal vision, a close cooperation, with rapid information sharing, is...

    Read Article
  • Multi-layered, Defense-in-Depth in Action

    Multi-layered, Defense-in-Depth in Action

    A light-hearted animation explains some of the key features of good software protection… Enjoy!

    Read Article
  • Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!

    Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!

    Internet of Medical Things (IoMT) devices are already revolutionizing the healthcare business.  They are delivering on their promises of improved data access, convenience, operational efficiencies...

    Read Article
  • Quantum Computing, Message Security and Whitebox Cryptography

    Quantum Computing, Message Security and Whitebox Cryptography

    The Cryptographic community has been watching the development of Quantum Computing for many years now. The looming specter of computation power able to break our current asymmetric algorithms such...

    Read Article
  • Black Hat 2018 – Major Innovations in the Works!

    Black Hat 2018 – Major Innovations in the Works!

    The Cloakware® team is back from Black Hat 2018, our favorite show of the year. This was an exciting milestone for us:  It was our second Black Hat with the re-launched Cloakware® Software...

    Read Article
  • New Cloakware® Report out now! Cloakware® Report, Edition 2: “Protect Your Software. Protect Your Business.”

    New Cloakware® Report out now! Cloakware® Report, Edition 2: “Protect Your Software. Protect Your Business.”

    Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In...

    Read Article
  • Why Secured Software is not Protected Software

    Why Secured Software is not Protected Software

    There are hundreds of articles out there encouraging you to “secure” your software, and several tools that help you find and address security vulnerabilities in your software.  No less an...

    Read Article
  • Your Evil Twin and You

    Your Evil Twin and You

    Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from...

    Read Article
  • Your Evil Twin and You

    Your Evil Twin and You

    Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from...

    Read Article
  • Cryptographic Agility

    Cryptographic Agility

    Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers....

    Read Article
  • Cryptographic Agility

    Cryptographic Agility

    Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers....

    Read Article
  • Cloakware Cate demonstrates dynamic analysis hacking

    Cloakware Cate demonstrates dynamic analysis hacking

    In the latest Cloakware Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application.  This simple...

    Read Article
  • More Than Meets The Eye… Software Transformation vs Obfuscation

    More Than Meets The Eye… Software Transformation vs Obfuscation

    In the field of software security, the term ‘obfuscation’ is often used, particularly when it is desired to protect software in a fully automated, “hands-free” manner. Software obfuscation is the...

    Read Article
  • loading
    Loading More...