New Cloakware Report out now! Cloakware Report, Edition 2: “Protect Your Software. Protect Your Business.”

August 9, 2018 Mark Roberts

Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In the second edition of the Cloakware Report we suggest that there is more to software protection than this.

What if it actually is a means to drive business by enabling or protecting business models? Could software protection be revenue generating (or at least revenue neutral)? In this latest Cloakware Report we have identified 3 business drivers for investing in a software protection strategy, and backed them up with nine distinct use cases drawn from our own experiences.

Read Cloakware Report 2 here.

If you haven’t already done so, now is also a good time to read the first Cloakware Report “The Necessity of Software Protection in Cybersecurity”, published earlier this year. It is now available with unrestricted download.

In this report we developed important insights about why software protection is a necessity in the modern, connected, software-defined world that we find ourselves in. The original report exposed why software-based products today are mostly unprotected, with below-par security, and left open to easy exploitation. These software vulnerabilities have turned into a systemic problem further exacerbated by the shortage of qualified cybersecurity specialists and lack of specific training for developers. The report delved into hacker methodologies at a high-level and proposed an effective strategy and process to counter the threat, concluding with an introduction to a comprehensive security-in-depth approach to software protection that we’ve described with the SPIDER acronym.

Read both reports today:

  1. Cloakware Report: The Necessity of Software Protection in Cybersecurity
  2. Cloakware Report 2: Protect Your Software. Protect Your Business.

No Previous Articles

Next Article
Quantum Computing, Message Security and White-Box Cryptography
Quantum Computing, Message Security and White-Box Cryptography

The Cryptographic community has been watching the development of Quantum Computing for many years now. The ...