So Many Reasons to Check Out AppViewX at the 2025 RSA Conference

So Many Reasons to Check Out AppViewX at the 2025 RSA Conference

The world of PKI and certificate management is evolving faster than ever. Tech giants like Google and Apple are advocating for shorter-lived certificates, Certificate Authorities (CAs) are undergoing major disruptions, and the ...
The SQL Server Crypto Detour

The SQL Server Crypto Detour

As part of my role as Service Architect here at SpecterOps, one of the things I’m tasked with is exploring all kinds of technologies to help those on assessments with advancing their ...

AIs as Trusted Third Parties

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: ...
The Critical Three-Phase Timeline PQC

The UK’s National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration

The United Kingdom’s National Cyber Security Centre (NCSC) has just released updated guidance on migrating to post-quantum cryptography (PQC) to help the nation prepare for developing threats posed by advances in quantum ...

Implementing Cryptography in AI Systems

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them with a desired ...

Hardware Cryptographic Accelerators to Enhance Security Without Slowing Down

From smartphones to smart homes and even industrial applications, embedded systems are everywhere. But as these systems become more prevalent in our daily lives, the risks of cyber threats grow just as ...
Best practices for key derivation

Best practices for key derivation

| | cryptography
By Marc Ilunga Key derivation is essential in many cryptographic applications, including key exchange, key management, secure communications, and building robust cryptographic primitives. But it’s also easy to get wrong: although standard ...

Celebrating our 2024 open-source contributions

While Trail of Bits is known for developing security tools like Slither, Medusa, and Fickling, our engineering efforts extend far beyond our own projects. Throughout 2024, our team has been deeply engaged ...

Navigating the Future of Secure Code Signing and Cryptography

In today’s interconnected world, the integrity of software has never been more critical. With the increasing reliance on open-source components and the complexities introduced by containerized applications, ensuring trust in software has ...

CISO Challenges for 2025: Overcoming Cybersecurity Complexities

As organizations recognize the immense value and criticality of your data and systems, cybersecurity has become intrinsically linked to business strategy. Chief Information Security Officers (CISOs) are increasingly expected to play a ...