Cloakable Tech Blog

Technical topics in the cybersecurity space

  • Quantum Computing, Message Security and Whitebox Cryptography

    Quantum Computing, Message Security and Whitebox Cryptography

    The Cryptographic community has been watching the development of Quantum Computing for many years now. The looming specter of computation power able to break our current asymmetric algorithms such...

    Read Article
  • Black Hat 2018 – Major Innovations in the Works!

    Black Hat 2018 – Major Innovations in the Works!

    The Cloakware® team is back from Black Hat 2018, our favorite show of the year. This was an exciting milestone for us:  It was our second Black Hat with the re-launched Cloakware Software...

    Read Article
  • New Cloakware Report out now! Cloakware Report, Edition 2: “Protect Your Software. Protect Your Business.”

    New Cloakware Report out now! Cloakware Report, Edition 2: “Protect Your Software. Protect Your Business.”

    Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In...

    Read Article
  • Why Secured Software is not Protected Software

    Why Secured Software is not Protected Software

    There are hundreds of articles out there encouraging you to “secure” your software, and several tools that help you find and address security vulnerabilities in your software.  No less an...

    Read Article
  • Your Evil Twin and You

    Your Evil Twin and You

    Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from...

    Read Article
  • Your Evil Twin and You

    Your Evil Twin and You

    Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from...

    Read Article
  • Cryptographic Agility

    Cryptographic Agility

    Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers....

    Read Article
  • Cryptographic Agility

    Cryptographic Agility

    Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers....

    Read Article
  • Cloakware Cate demonstrates dynamic analysis hacking

    In the latest Cloakware Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application.  This simple...

    Read Article
  • Cloakware Cate demonstrates dynamic analysis hacking

    Cloakware Cate demonstrates dynamic analysis hacking

    In the latest Cloakware Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application.  This simple...

    Read Article
  • More Than Meets The Eye… Software Transformation vs Obfuscation

    More Than Meets The Eye… Software Transformation vs Obfuscation

    In the field of software security, the term ‘obfuscation’ is often used, particularly when it is desired to protect software in a fully automated, “hands-free” manner. Software obfuscation is the...

    Read Article
  • More Than Meets The Eye… Software Transformation vs Obfuscation

    More Than Meets The Eye… Software Transformation vs Obfuscation

    In the field of software security, the term ‘obfuscation’ is often used, particularly when it is desired to protect software in a fully automated, “hands-free” manner. Software obfuscation is the...

    Read Article
  • Jenkins in the cloud

    Jenkins in the cloud

    Continuous Integration, also know as CI, is an important part of modern software development. In fact it is a real game changer when Continuous Integration is introduced into an organisation,...

    Read Article
  • Jenkins in the cloud

    Jenkins in the cloud

    Continuous Integration, also know as CI, is an important part of modern software development. In fact it is a real game changer when Continuous Integration is introduced into an organisation,...

    Read Article
  • Cloakware Cate Teaches You Tools and Techniques of Hackers

    We’ve just introduced a new Youtube video series by Cloakware Cate.  Our Senior Architect, Catherine, will show you the tools and techniques hackers use to reverse engineer your apps in...

    Read Article
  • Cloakware Cate Teaches You Tools and Techniques of Hackers

    Cloakware Cate Teaches You Tools and Techniques of Hackers

    We’ve just introduced a new Youtube video series by Cloakware Cate.  Our Senior Architect, Catherine, will show you the tools and techniques hackers use to reverse engineer your apps in...

    Read Article
  • IoT Security Is Not One Chip Shopping

    This past week I’ve been reading the specifications for Trusted Platform Modules (TPM) published by the Trusted Computing Group of companies.  It seems to me they’ve done a lot of things right,...

    Read Article
  • IoT Security Is Not One Chip Shopping

    IoT Security Is Not One Chip Shopping

    This past week I’ve been reading the specifications for Trusted Platform Modules (TPM) published by the Trusted Computing Group of companies.  It seems to me they’ve done a lot of things right,...

    Read Article
  • Stacy, The Old-School Car Guy

    We’ve started creating short, succinct videos on YouTube to help explain key concepts and issues around protecting keys, code and data associated with embedded systems. One series is Stacy Janes...

    Read Article
  • Stacy, The Old-School Car Guy

    Stacy, The Old-School Car Guy

    We’ve started creating short, succinct videos on YouTube to help explain key concepts and issues around protecting keys, code and data associated with embedded systems. One series is Stacy Janes...

    Read Article
  • loading
    Loading More...