Internet of Medical Things (IoMT) devices are already revolutionizing the healthcare business. They are delivering on their promises of improved data access, convenience, operational efficiencies and automation for the Health Care Providers (HCP). Additional drivers […]
There are hundreds of articles out there encouraging you to “secure” your software, and several tools that help you find and address security vulnerabilities in your software. No less an authority than CERT publishes a secure […]
Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from live processes have turned the use of digital twins into a must for the system owner and operator. But what is the twin in the hands of a potential hacker? Read Dave Belt’s new blog…
In the latest Cloakware® Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application. This simple demonstration captures the essentials […]
Continuous Integration, also know as CI, is an important part of modern software development. In fact it is a real game changer when Continuous Integration is introduced into an organisation, since it radically alters the way teams think about the whole development process.
We’ve just introduced a new Youtube video series by Cloakware® Cate. Our Senior Architect, Catherine, will show you the tools and techniques hackers use to reverse engineer your apps in preparation for hacking your code, […]
As someone who works with cloud solutions for a security company, I am very aware of the stories in various media about security breaches in cloud accounts. Usually these are along the lines of “Company […]