Cloud computing is an essential component of online businesses today. We are now seeing rapid growth in the demand for multiple public and private cloud platforms. Behind this expansion is a need for a cost-effective way to develop and deploy new and innovative software faster so companies can more effectively win, serve, and retain customers. […]
Read More
Last week Dyadic announced that we closed a $12M Series B funding round led by Goldman Sachs Principal Strategic Investments, and joined by Citi Ventures and Eric Schmidt’s Innovation Endeavors. This achievement has been both inspiring and humbling for myself and for my co-founders, Prof. Yehuda Lindell, Guy Peer and Prof. Nigel Smart. In the […]
Read More
We hear more and more often that the existing solutions for storage and management of keys aren’t meeting organizations’ demand for one product that lets them manage asymmetric keys and certificates as well as symmetric keys from the same console. The reason that that there isn’t really one product that does it all today is […]
Read More
Blockchain, with its application of the cryptographic distributed ledger architecture, could potentially bring spectacular disruption across all industries. However, in our enthusiasm, we must not overlook the security risks that this new technology brings. The matter of key protection and key governance in blockchain is a crucial yet mostly unresolved obstacle. This is the first-time […]
Read More
The first session of the second day of Real World Crypto was on Multi-Party Computation. It is a great test of cryptographic development that this once theoretical topic now fills a full session at an event such as Real World Crypto. The first talk was given by Dyadic’s co-founder Yehuda Lindell. Yehuda stressed the importance […]
Read More
The main event at RWC 2017 on the first day was the award of the 2017 Levchin prize for Real World Cryptography. This is two awards of $10,000 each to a person, or group, to reward work on impactful cryptography. The awards were given out again by Max Levchin, who has sponsored the award in […]
Read More
Today sees the start of Real World Crypto 2017 in New York. This is the yearly gathering of cryptographers from both industry and academia who are interested in the more practical end of cryptography. This year the event is bigger than ever, with over 550 registrations. Of these 50% are from industry, plus 22% students […]
Read More
The security team from Promon recently showed that security measures on a mobile app protecting Tesla cars can be broken, providing attackers full control over the car. The Tesla mobile app authenticates using a secret key that is stored locally by the app, and is therefore vulnerable to theft by malware that infects the phone. […]
Read More
The term “Software-defined” might be ubiquitous, but it is far more than a buzzword. It represents one of the largest transformative shifts in how we do infrastructure since the introduction of datacenters. In this era of everything becoming Software-Defined, we’re seeing technologies that were traditionally tied to hardware being released from their hardware restraints. These […]
Read More
In 1989, Daniel Klein carried out a study showing how weak passwords can be broken on Unix systems (https://www.klein.com/dvk/publications/passwd.pdf). It was already clear in the 1990s that passwords are a very problematic solution for authentication. In 2004, Bill Gates announced that passwords are dead (https://www.cnet.com/news/gates-predicts-death-of-the-password/), and many have followed since. However, look around! Your passwords […]
Read More