Skip to main content
Google Tag Manager
Arxan Application Protection
Apperian App Management
Advanced Threat Team
Awards & Affiliations
Utility Nav Menu
Blog Posts by
back to the blog
17 blog posts
Jan 24, 2018
Meltdown, Spectre prove there are no trusted environments for high-value applications
If there’s a lesson from the newly discovered Meltdown and Spectre exploits, it’s that pretty much every company th ...
Oct 17, 2017
by Asma Zubair, Senior Director of Product Management
Aug 22, 2017
Feb 17, 2017
Jan 25, 2017
Connected Medical Devices – A Prescription for Cybersecurity Nightmare Unless You Act Now!
Era of IoT is here - digitally connected devices are enhancing every aspect of our lives, including our homes, cars, and ...
Nov 22, 2016
Retail Mobile Apps – A Lucrative Frontier For Hackers
As consumers continue to adopt the "always connected" lifestyle, mobile is transforming the world in extraordinary ways. ...
Feb 18, 2016
Leverage White-Box Cryptography and Tamper Resistance to Advance API Protection
Do you know how easy it is for hackers to gain access to server assets by exploiting API (Application Program Interface) call ...
Jan 25, 2016
How to Enhance Your Cryptographic Key Protection
Introduction to Cryptographic Key Protection Watch the Video Cryptography is at the heart of data secu
Copyright © 2018. ARXAN. All Rights Reserved.