Dyadic has built a pure-software privacy, security, identity infrastructure that supports the massive scale, speed and agility requirements fueled by the cloud, mobility, IoT and blockchain revolutions. Learn more.
Webinars - Live and On-Demand
A New Risk Management Paradigm for Cloud Computing
How to Go Beyond BYOK with CYOK (Control Your Own Keys): Learn how SaaS/IaaS providers and their customers can work together to enable CYOK as a safeguard to ensure sensitive assets remain secure even when a nightmare turns to a reality.
LIVE: Thursday, July 12 at 11:00am ET/ 8:00am PT.
Key Protection and Governance
Securing the Blockchain: the importance of private key protection in any blockchain infrastructure and why blockchain cannot rely on traditional methods for key protection. What must new methods of key protection be introduced for blockchain to deliver on its promises?
Securing Data in Perimeter-less, Multi-Cloud Environments
Two major banks have teamed with Dyadic to reinvent data protection for the Digital Banking age. The financial services industry is becoming more digital, with traditional data centers moving into the cloud and transitioning to new agile delivery models of apps, containers, and dockers – bringing about new challenges and solutions.
Authentication & Identity in the Digital Banking Era
The emergence of multiple online services in various digital channels and the rise of Fintech, combined with the mobility and IoT revolution is rapidly turning banking virtual – bringing authentication and identity great attention and importance.
2017 New Standards for Code SigningBest practices for implementing secure code singing :Best practices for implementing secure code signing : Join us as we explore approaches for code signing, and review best practices. We’ll highlight some of the new challenges in protecting code signing private keys and certificates in today’s world of increased virtualization, scaling and distribution.
Keeping Control of Your Keys in the Public Cloud
Learn how Dyadic Enterprise Key Management lets you maintain full control of your private keys in any public cloud environments. No one, not even the cloud provider, can access your keys. Includes demo.
The Magic of MPCLearn the Science behind Dyadic’s Technology Dyadic co-founder, Professor Nigel Smart unveils some of the magic behind Multiparty Computation (MPC) including examples of use in real-world scenarios. You don’t have to be a cryptographer or a mathematician to enjoy this webinar. Suitable for both math freaks and math-phobes!
Securing Data-in-use in the Cloud - Myths and FactsRecorded Live at BlueHat IL 2017: In this talk, we will demystify these solutions and provide a deep understanding that is necessary for analyzing their security. Attacks will be presented that show that strong security claims often attributed to some solutions do not hold up.
Read this whitepaper to learn more about how Dyadic enables every device to have a virtual hardware security module (vHSM), where sensitive encryption keys can be stored securely with the strong security guarantees that were previously only available through the use of dedicated hardware.
Get an in-depth explaination of how Dyadic uses MPC to secure keys with mathematically proven security guarantees. Learn what makes multiparty computation (MPC) protocols secure and how this is determined.