Skip to main content
Google Tag Manager
Arxan Application Protection
Arxan Threat Analytics
Apperian App Management
Advanced Threat Team
Awards & Affiliations
Blog Posts by
back to the blog
17 blog posts
Jan 24, 2018
Meltdown, Spectre prove there are no trusted environments for high-value applications
If there’s a lesson from the newly discovered Meltdown and Spectre exploits, it’s that pretty much every company th ...
Oct 17, 2017
by Asma Zubair, Senior Director of Product Management
Aug 22, 2017
At Black Hat 2017, Aaron Lint, VP of Research, and Paul Dant, Senior Security Engineer, explained their philosophies on JavaS ...
Feb 17, 2017
Jan 25, 2017
Connected Medical Devices – A Prescription for Cybersecurity Nightmare Unless You Act Now!
Era of IoT is here - digitally connected devices are enhancing every aspect of our lives, including our homes, cars, ...
Nov 21, 2016
Retail Mobile Apps – A Lucrative Frontier For Hackers
As consumers continue to adopt the "always connected" lifestyle, mobile is transforming the world in extraordinary wa ...
Feb 18, 2016
Leverage White-Box Cryptography and Tamper Resistance to Advance API Protection
Do you know how easy it is for hackers to gain access to server assets by exploiting API (Application Program Interface) call ...
Jan 25, 2016
How to Enhance Your Cryptographic Key Protection
Introduction to Cryptographic Key Protection Cryptography is at the heart of data security, and it has become an indispensab ...
Copyright © 2019. ARXAN. All Rights Reserved.