Cloakable Tech Blog

Technical topics in the cybersecurity space

  • Thoughts on Software Trustworthiness Best Practices

    Software is the invisible fabric that enables the world to interact, transact, and function. Software is at the heart of an amazing and bewildering explosion of functionality: from running your...

    Read Article
  • Security Considerations when Deploying a Digital Twin

    Security Considerations when Deploying a Digital Twin

    The modern world is connected. Globalization has resulted in industries competing with counterparts in distant locations. Increased competition has led to a drive for efficiency and optimization...

    Read Article
  • Artificial Intelligence Cage Match: Using AI Defenses Against AI Attacks

    Artificial Intelligence Cage Match: Using AI Defenses Against AI Attacks

    In our last post, we discussed how recent advances in AI and ML can be used for good and bad. In this installment, I’ll explain why it’s so easy for security vulnerabilities to make their […]

    Read Article
  • Adversarial ML and IoT

    Adversarial ML and IoT

    A lot has changed since I first started applying machine learning (ML) in the 1990s. Back then, using something like a neural network meant implementing everything, including the learning...

    Read Article
  • What Would Privacy-Preserving ML Look Like? — Part 2

    What Would Privacy-Preserving ML Look Like? — Part 2

    In my previous post, we covered why protecting the privacy (and confidentiality) of data is so paramount and how ML-based systems amplify privacy concerns due to the sheer amount of data and the...

    Read Article
  • When Twins Go Bad — Model Poisoning Attacks on Digital Twins

    When Twins Go Bad — Model Poisoning Attacks on Digital Twins

    The manufacturing industry already appreciates the cost savings and efficiency improvements that digital twins offer. With information about the design, operation, and maintenance of devices all...

    Read Article
  • Cybersecurity and Additive Manufacturing: Tell Me Something I Don’t Already Know

    Cybersecurity and Additive Manufacturing: Tell Me Something I Don’t Already Know

    Pick a cybersecurity survey, any survey from any provider. Go ahead. I’ll wait. That survey you picked is going to tell you that: Despite your best efforts, your business is hopelessly exposed....

    Read Article
  • Critical Infrastructure Security and Resilience Month – Should It Be Every Month?

    Critical Infrastructure Security and Resilience Month – Should It Be Every Month?

    I had the privilege to attend an industry event in September 2019, where William Evanina, Director of US National Counterintelligence and Security Center (NCSC), was speaking to some of IIoT’s...

    Read Article
  • What Would Privacy-Preserving ML Look Like?

    What Would Privacy-Preserving ML Look Like?

    Artificial intelligence (AI) and machine learning (ML) have made huge gains over the last few years, thanks to the vast amount of data available and to the gains made in raw hardware processing...

    Read Article
  • Whitebox Attacks… on Hardware?

    Whitebox Attacks… on Hardware?

    In our very first Cloakable blog post, we discussed why whitebox cryptography is so important when developing software that needs to keep data and keys secure.  Specifically, we discussed how...

    Read Article
  • On Booth Duty at Black Hat

    On Booth Duty at Black Hat

    Our team is back from Las Vegas where Black Hat USA 2019 was held two weeks ago. The main themes this year included IoT, application security, and the role of humans in security and privacy. […]

    Read Article
  • Humans Front and Center at the Connected Manufacturing Forum

    Humans Front and Center at the Connected Manufacturing Forum

    Last week, members of our IoT Security Market Unit attended the Connected Manufacturing Forum in Austin, Texas. The two-day event focused on how to move the dial around Industry 4.0, and how to go...

    Read Article
  • Industry 4.0: How cybersecurity threats are everyone’s business

    Industry 4.0: How cybersecurity threats are everyone’s business

    A big part of Industry 4.0 requires the successful integration of the supply chain into the manufacturing process.  In the ideal vision, a close cooperation, with rapid information sharing, is...

    Read Article
  • Multi-layered, Defense-in-Depth in Action

    Multi-layered, Defense-in-Depth in Action

    A light-hearted animation explains some of the key features of good software protection… Enjoy!

    Read Article
  • Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!

    Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!

    Internet of Medical Things (IoMT) devices are already revolutionizing the healthcare business.  They are delivering on their promises of improved data access, convenience, operational efficiencies...

    Read Article
  • Quantum Computing, Message Security and Whitebox Cryptography

    Quantum Computing, Message Security and Whitebox Cryptography

    The Cryptographic community has been watching the development of Quantum Computing for many years now. The looming specter of computation power able to break our current asymmetric algorithms such...

    Read Article
  • Black Hat 2018 – Major Innovations in the Works!

    Black Hat 2018 – Major Innovations in the Works!

    The Cloakware® team is back from Black Hat 2018, our favorite show of the year. This was an exciting milestone for us:  It was our second Black Hat with the re-launched Cloakware® Software...

    Read Article
  • New Cloakware® Report out now! Cloakware® Report, Edition 2: “Protect Your Software. Protect Your Business.”

    New Cloakware® Report out now! Cloakware® Report, Edition 2: “Protect Your Software. Protect Your Business.”

    Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In...

    Read Article
  • Why Secured Software is not Protected Software

    Why Secured Software is not Protected Software

    There are hundreds of articles out there encouraging you to “secure” your software, and several tools that help you find and address security vulnerabilities in your software.  No less an...

    Read Article
  • Your Evil Twin and You

    Your Evil Twin and You

    Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from...

    Read Article
  • loading
    Loading More...