CYBERCRYPT Webinar – Cyber & Product Development Security
What was it about?
The 17th of June, 2021, INSCALE and CYBERCRYPT held a webinar about Cyber & Product Development Security, where the key speakers, Peter Jerry, Frederik Gottlieb and Esben Mogensen, from our partner and ‘NAVY SEALS’ of product security CYBERCRYPT, talked about elevating the security posture of your products, adapting to security trends, and withstanding threats of the future.
Subjects raised included Security Priorities at the Board Level, Threat Picture, Encryptonize – Data Protection for Cloud Workloads, Blackbox Analysis (reverse engineering), Security Architecture and Cryptography, all matters interesting to secure intellectual property, data, products and to safeguard assets of your customers.
Want to get notified about future events? Sign up to our event newsletter!
Why was it of any interest?
Technology is now becoming better and more advanced, and cyber-attacks present a growing threat to businesses and individuals. To protect our businesses and critical data, strong cryptographic protection in every device and application is more than needed. The webinar registrants collectively agreed, that sufficient product and IP protection is one of the most relevant concerns of today. A good implementation of the right security mechanisms, no matter if it’s for embedded software, native apps, cloud workloads etc., leads to the highest protection standards for your products/services and will be essential to protect your brand and revenue.
How does CYBERCRYPT handle Product Security?
CYBERCRYPT has a total of 4 specialized product security teams that are working together to help customers elevate their products’ security posture.
Security for embedded software and devices
IoT, edge computing, smarthome, medical, automotive, automation, etc. Within this team, we employ several white-hat “hackers”. They are also part of a prominent CTF team in Germany that is among top 10 in the world and organises its own highly acclaimed CTF competition annually.
In-app protection and app shielding
Code obfuscation as well as anti-dynamic and anti-symbolic countermeasures to protect your Intellectual Property inside a mobile app or any other application. Here we rely on our bespoke software technology for in-app protection. We also have tools and capabilities for reverse-engineering and binary analysis.
Backend & cloud security
Design and implementation of security architecture for the workloads in a cloud environment, data security in the cloud, DevSecOps, Kubernetes security, container etc. In the part of data security in the cloud, we base on our bespoke software technology called Encryptonize for application-layer encryption, which will be suitable for any cloud.
Expertise in cryptography across all these 3 areas above is a major differentiator that separates us from most companies in the world providing services within secure product development. Indeed, we have professors and cryptographic PhD on our payroll to deal with a problem of any complexity level in this field, from lightweight cryptography for low-resource embedded devices all the way to post-quantum publickey cryptography to thwart the threat constituted by emerging quantum computers that would render all the currently used public-key cryptography insecure.