Cloakable

Technical topics in the cybersecurity space

Skip to content
  • Home
  • About Irdeto
  • Contributors
  • Contact Us

Uncategorized

Stacy, The Old-School Car Guy

  • by Mark Roberts
  • Posted on January 29, 2018January 31, 2018
  • Automotive

We’ve started creating short, succinct videos on YouTube to help explain key concepts and issues around protecting keys, code and data associated with embedded systems. One series is Stacy Janes “Old-School Car Guy” which explains […]

Read More

Visit our web site


Read Irdeto’s Privacy Policy

 
Truste logo

Visit our Irdeto Perspective blog

Irdeto Perspective blog

Subscribe to Blog

Click to follow this blog and receive notifications of new posts by email.

Recent Posts

  • When Twins Go Bad — Model Poisoning Attacks on Digital Twins
  • Cybersecurity and Additive Manufacturing: Tell Me Something I Don’t Already Know
  • Critical Infrastructure Security and Resilience Month – Should It Be Every Month?
  • What Would Privacy-Preserving ML Look Like?
  • Whitebox Attacks… on Hardware?

Categories

  • Automotive
  • Black Hat
  • Cybersecurity and Business
  • Development
  • Evolving security
  • How-to
  • IIoT
  • Practical Guides
  • Software Protection Technology
  • Uncategorized
  • White-Box Cryptography

Follow Us

YouTube

Twitter

LinkedIn

RSS

Tags

AI Alina Automated Security Checks AWS buffer overflow connected transport cryptography cybersecurity database design data consistency defense in depth defense model deployment distributed systems diversity docker entanglement Hacker Hardware Security high availability HowTo HSM integrity verification IoT java meltdown memory scraping nosql obfuscation old-school car guy perimeter renewability reverse engineering secure environment security Security Baseline software protection spectre sql Stacy Janes TEE TPM white box attacks whitebox cryptography White box cryptography

Categories

  • Automotive
  • Black Hat
  • Cybersecurity and Business
  • Development
  • Evolving security
  • How-to
  • IIoT
  • Practical Guides
  • Software Protection Technology
  • Uncategorized
  • White-Box Cryptography

Recent Posts

  • When Twins Go Bad — Model Poisoning Attacks on Digital Twins
  • Cybersecurity and Additive Manufacturing: Tell Me Something I Don’t Already Know
  • Critical Infrastructure Security and Resilience Month – Should It Be Every Month?
  • What Would Privacy-Preserving ML Look Like?
  • Whitebox Attacks… on Hardware?

Recent Comments

  • IoT Security Is Not One Chip Shopping – Cloakable on Software Protection is Like a SPIDER Web…
  • The Perimeter is a lie – an approach (part 2) – Cloakable on The perimeter is a lie (part 1)

Archives

  • December 2019
  • November 2019
  • August 2019
  • June 2019
  • March 2019
  • January 2019
  • October 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • February 2018
  • January 2018
  • October 2017
  • September 2017
  • August 2017
  • July 2017

Privacy

Website Privacy Policy


© 2019 Irdeto. All Rights Reserved.

© Copyright 2019 - Cloakable
Magazine WordPress Themes by DesignOrbital