Cloakable Tech Blog

Technical topics in the cybersecurity space

  • Whitebox Attacks… on Hardware?

    Whitebox Attacks… on Hardware?

    In our very first Cloakable blog post, we discussed why whitebox cryptography is so important when developing software that needs to keep data and keys secure.  Specifically, we discussed how...

    Read Article
  • On Booth Duty at Black Hat

    On Booth Duty at Black Hat

    Our team is back from Las Vegas where Black Hat USA 2019 was held two weeks ago. The main themes this year included IoT, application security, and the role of humans in security and privacy. […]

    Read Article
  • Humans Front and Center at the Connected Manufacturing Forum

    Humans Front and Center at the Connected Manufacturing Forum

    Last week, members of our IoT Security Market Unit attended the Connected Manufacturing Forum in Austin, Texas. The two-day event focused on how to move the dial around Industry 4.0, and how to go...

    Read Article
  • Industry 4.0: How cybersecurity threats are everyone’s business

    Industry 4.0: How cybersecurity threats are everyone’s business

    A big part of Industry 4.0 requires the successful integration of the supply chain into the manufacturing process.  In the ideal vision, a close cooperation, with rapid information sharing, is...

    Read Article
  • Multi-layered, Defense-in-Depth in Action

    Multi-layered, Defense-in-Depth in Action

    A light-hearted animation explains some of the key features of good software protection… Enjoy!

    Read Article
  • Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!

    Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!

    Internet of Medical Things (IoMT) devices are already revolutionizing the healthcare business.  They are delivering on their promises of improved data access, convenience, operational efficiencies...

    Read Article
  • Quantum Computing, Message Security and Whitebox Cryptography

    Quantum Computing, Message Security and Whitebox Cryptography

    The Cryptographic community has been watching the development of Quantum Computing for many years now. The looming specter of computation power able to break our current asymmetric algorithms such...

    Read Article
  • Black Hat 2018 – Major Innovations in the Works!

    Black Hat 2018 – Major Innovations in the Works!

    The Cloakware® team is back from Black Hat 2018, our favorite show of the year. This was an exciting milestone for us:  It was our second Black Hat with the re-launched Cloakware Software...

    Read Article
  • New Cloakware Report out now! Cloakware Report, Edition 2: “Protect Your Software. Protect Your Business.”

    New Cloakware Report out now! Cloakware Report, Edition 2: “Protect Your Software. Protect Your Business.”

    Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In...

    Read Article
  • Why Secured Software is not Protected Software

    Why Secured Software is not Protected Software

    There are hundreds of articles out there encouraging you to “secure” your software, and several tools that help you find and address security vulnerabilities in your software.  No less an...

    Read Article
  • Your Evil Twin and You

    Your Evil Twin and You

    Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from...

    Read Article
  • Your Evil Twin and You

    Your Evil Twin and You

    Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from...

    Read Article
  • Cryptographic Agility

    Cryptographic Agility

    Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers....

    Read Article
  • Cryptographic Agility

    Cryptographic Agility

    Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers....

    Read Article
  • Cloakware Cate demonstrates dynamic analysis hacking

    Cloakware Cate demonstrates dynamic analysis hacking

    In the latest Cloakware Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application.  This simple...

    Read Article
  • More Than Meets The Eye… Software Transformation vs Obfuscation

    More Than Meets The Eye… Software Transformation vs Obfuscation

    In the field of software security, the term ‘obfuscation’ is often used, particularly when it is desired to protect software in a fully automated, “hands-free” manner. Software obfuscation is the...

    Read Article
  • More Than Meets The Eye… Software Transformation vs Obfuscation

    More Than Meets The Eye… Software Transformation vs Obfuscation

    In the field of software security, the term ‘obfuscation’ is often used, particularly when it is desired to protect software in a fully automated, “hands-free” manner. Software obfuscation is the...

    Read Article
  • Jenkins in the cloud

    Jenkins in the cloud

    Continuous Integration, also know as CI, is an important part of modern software development. In fact it is a real game changer when Continuous Integration is introduced into an organisation,...

    Read Article
  • Jenkins in the cloud

    Jenkins in the cloud

    Continuous Integration, also know as CI, is an important part of modern software development. In fact it is a real game changer when Continuous Integration is introduced into an organisation,...

    Read Article
  • Cloakware Cate Teaches You Tools and Techniques of Hackers

    Cloakware Cate Teaches You Tools and Techniques of Hackers

    We’ve just introduced a new Youtube video series by Cloakware Cate.  Our Senior Architect, Catherine, will show you the tools and techniques hackers use to reverse engineer your apps in...

    Read Article
  • loading
    Loading More...