New Cloakware Report out now! Cloakware Report, Edition 2: “Protect Your Software. Protect Your Business.”

Venn Diagram: What are the key business drivers for Software Protection - with examples

Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In the second edition of the Cloakware Report we suggest that there is more to software protection than this…

Cryptographic Agility

Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers. Whatever lies ahead, the real question is, are you ready for change? Read more about Cryptographic agility, or cryptoagility…