
Unbound Security
@UnboundSecurity
Followers
1K
Following
551
Media
511
Statuses
2K
Protecting crypto keys & data w/o dependence on secure HW, & offering more control on any cloud #multipartycomputation Founders: @LindellYehuda @SmartCryptology
Joined October 2014
In today’s age of #cloud and #mobilefirst, creating and maintaining infrastructure manually across hyper scalers and on-premises is no longer sustainable. See how modern #DevOps and Cloud Engineering teams are tackling this issue.
0
0
5
#GDPR is inspiring privacy laws far beyond Europe and is also having a global effect on how #cryptography is used for #datasecurity.
0
1
3
Users aren’t great at remembering #passwords, and even if they are, hacks and other vulnerabilities can still happen. Looking for a more secure alternative to 2FA? .#authentication #mfa #multifactorauthentication #hacking.
0
2
4
There's still time to register for tomorrow's webinar with Cloudical and White & Case on the challenges and considerations of being a future-ready, #cloud enabled enterprise while leveraging existing, on-prem investments. #multicloud #hybridcloud .
0
1
2
Supporting #applications for several clouds + key management systems on-prem, #hybridcloud and #multicloud = fragmentation. How can the #enterprise centrally enforce policy and mitigate risk? #virtualization .
0
1
2
Join us next week for a great conversation with Cloudical and White & Case as we walk through the challenges and considerations of being a future-ready, #cloud enabled enterprise while leveraging existing, on-premise investments. #multicloud #hybridcloud.
0
1
2
Great read on the characteristics of an effective key management strategy, including best practices to implement and common pitfalls to avoid. #encryption #keymanagement #cryptography .
0
3
3
Great read on how organizations leverage cryptographic control of their most critical data in the #cloud and what security considerations should be addressed to bypass vulnerabilities. #datasecurity #hybridcloud #multicloud .
cloudsecurityalliance.org
Explore how to leverage cryptographic control of your data in the cloud and what security concerns should be addressed when deploying these technologies.
0
1
1
Here's a developer’s perspective on the need for code signing across the technology stacks they work on. #devops #cicd #codesigning #continuousintegration #continuousdelivery.
0
1
1
Post-pandemic work-from-home or work-from-anywhere is the new normal, make sure your security infrastructure is up to the task. #wfh #remotework #datasecurity .
0
0
1
The mass #migration of workloads to the #cloud and the growing use of #hybridcloud infrastructures present real difficulties when it comes to the use of encryption keys for #dataprotection and applications.
0
0
0
Never treat #cloudsecurity as an afterthought when selecting and deploying #cloud services. Continue reading for some great advice for your organization >> .
0
1
1
Moving away from hardware-based, legacy cryptographic systems by virtualizing #cryptography helps ensure that organizations stay safe from breaches and successfully pass #compliance audits.
0
1
2
In case you missed it, here's the recording of today's webinar, highlighting our latest release of Unbound CORE. #cryptography #cloud #datasecurity .
0
1
2
Join us tomorrow for an exclusive look at our latest release of Unbound CORE, highlighting key client deployments that have realized cryptographic virtualization across their infrastructure. #cryptography #cloud .
0
2
2
Here's a fun overview of Unbound's CORE platform using Legos. Enjoy! .#cryptography #cybersecurity.
0
2
2
Great article from Forbes Technology Council on #dataprivacy leveraging MPC and #cryptography, with Unbound at the forefront of this movement. #cybersecurity.
0
3
1
We had a great first day at #Money2020USA. Stop by Booth K2404 today for a conversation and a chance to win a $100 casino chip! #Money2020
0
0
1
Join @LindellYehuda next week at the Encryption Consulting Virtual Conference! #ECconference2021 #Cryptography #PKI #Encryption #DataProtection #CloudKeyManagement #TechEvent #CyberSecurityThoughtLeaders #CyberSecurity #HSM #CodeSigning .
0
2
3