Quantcast
Channel: UKC blog – Unbound
Browsing latest articles
Browse All 13 View Live

Image may be NSFW.
Clik here to view.

Unbound receives FIPS 140-2 Level 1 and FIPS 140-2 Level 2 certification

Unbound is thrilled to have passed FIPS 140-2 certification for Unbound Key Control (UKC). This significant milestone for Unbound gives us strong industry validation of our pioneering virtual HSM and...

View Article



Image may be NSFW.
Clik here to view.

Software-Defined Cryptography: A Four-Stage Approach to Realizing the Value

Gluing the terms software-defined and cryptography together in one phrase may seem counter-intuitive at first. Just like the realm of networking where the software-defined trend first gained momentum,...

View Article

Image may be NSFW.
Clik here to view.

When Traditional High Availability Is Not Good Enough

In this blog, we will explore how one can provide a highly available key management and vHSM service, for the relevant cryptographic use cases, comparing Unbound pure-software technology to the legacy...

View Article

Image may be NSFW.
Clik here to view.

Lessons Learned from Recently-Discovered Major Vulnerabilities in Hardware...

Hardware Security Modules (HSMs) are physical boxes that carry out cryptographic operations, and never reveal the keys inside. They are designed to have very high security, and as such, are used to...

View Article

Image may be NSFW.
Clik here to view.

DevSecOps: Looking at Code Signing Holistically

Code signing proves the identity of the source vendor of a software (only the private code signing key holder can create the signature) and verifies that the code has not been tampered with since...

View Article


Image may be NSFW.
Clik here to view.

How to Hack an Hardware Security Module (HSM)

Ever wondered how it’s possible to hack a hardware security module (HSM)? ​We recently had the opportunity to chat with Dr. Fotis Loukos, researcher at the Aristotle University of Thessaloniki and...

View Article

Image may be NSFW.
Clik here to view.

Unbound Named as Gartner “Cool Vendor” for Blockchain Security and Privacy

We’re delighted to announce that Unbound Tech has been named a Gartner “Cool Vendor” for Blockchain Security and Privacy in 2019. In the report, Gartner analysts raised the primary issue of blockchain...

View Article

Watch: New Directions in Software Key Protection

Our CEO and co-founder, Professor Yehuda Lindell, spoke at the 2019 Crypto Breakfast last month – and spoke about the transformation in how cryptography is viewed in the security world and beyond.   In...

View Article


Image may be NSFW.
Clik here to view.

Code Signing with Extended Validation (EV) Certificates

You’ve probably noticed when surfing the web, some browsers show a special indicator like a green bar containing the company name, or in some instances, completely replacing the URL with the company...

View Article


Image may be NSFW.
Clik here to view.

Unbound Partners with Google to Give GCP & BigQuery Customers more control...

It’s official, Unbound Tech and Google Cloud are now partners–customers can now store encryption keys completely outside of Google’s infrastructure, giving customers more confidence when storing...

View Article
Browsing latest articles
Browse All 13 View Live




Latest Images