A big part of Industry 4.0 requires the successful integration of the supply chain into the manufacturing process. In the ideal vision, a close cooperation, with rapid information sharing, is established between suppliers, the manufacturer […]
A light-hearted animation explains some of the key features of good software protection… Enjoy!
The Cloakware® team is back from Black Hat 2018, our favorite show of the year. This was an exciting milestone for us: It was our second Black Hat with the re-launched Cloakware® Software Protection product, […]
Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In the second edition of the Cloakware Report we suggest that there is more to software protection than this…
In the latest Cloakware® Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application. This simple demonstration captures the essentials […]
We’ve just introduced a new Youtube video series by Cloakware® Cate. Our Senior Architect, Catherine, will show you the tools and techniques hackers use to reverse engineer your apps in preparation for hacking your code, […]
We’ve started creating short, succinct videos on YouTube to help explain key concepts and issues around protecting keys, code and data associated with embedded systems. One series is Stacy Janes “Old-School Car Guy” which explains […]
Software Protection: Integrity, Diversity, Entanglement and Renewability (SPIDER) We’ve spent a lot of time finding a suitable analogy to explain the more subtle aspects of defense in depth and the multi-layered approach to cybersecurity that […]
Ofttimes it has been difficult to explain the role of software protection in hardware-protected secure systems, but recently security researchers have helped us out by providing many examples of zero-day exploits where flaws that are baked into hardware or firmware lead to exploitable vulnerabilities in systems. In this article we are having a look at Spectre & Meltdown and explore how these attacks could have been avoided using application protection technology.