Resource Center

Videos

Encrypting Vector Databases: How and Why Embeddings Need to be Protected with Colt and Patrick

Not sure how to protect sensitive data in a vector database? Colt and Patrick discuss why and how you can encrypt data you store in a vector database while maintaining usability.

Videos

Facial Recognition Risks with Murph and Craig

Hacking facial recognition embeddings is surprisingly easy. Craig and Murph discuss the process of attacking facial embeddings, the results (which are very accurate), and the implications of facial recognition attacks.

Videos

Retrieval-Augmented Generation (RAG) Architecture Security Risks with Patrick and Bob

Patrick and Bob discuss retrieval-augmented generation (RAG), its purpose, how it works, and its potential security and privacy issues, particularly with vector databases.

Newsletters

Unmasking Facial Recognition Security Threats

We expose some risks of data leakage that your facial recognition systems almost certainly has

Blogs

There and Back Again: An Embedding Attack Journey

Reversing text embeddings is so easy, even your grandmother can do it. Encrypt them to avoid leaking all your sensitive data to the internet.

8 min read

Blogs

The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

Is your facial recognition system leaking faces like a sieve? Yup. Can you stop it? Yes.

7 min read

Blogs

7 Predictions for 2024

The hype machine is in full swing, but our predictions ignore the baloney and focus on what's likely.

25 min read

Newsletters

Happy Holidays

We take a look at how our year is wrapping up, capped by the release of Cloaked AI

Videos

Cloaked AI Demo: Part 1

This is a demo of Cloaked AI, the first and only encryption solution that gives you the power to protect sensitive data in your vector database of choice.

Newsletters

Unlock gen AI potential with data protection from Cloaked AI

Announcing the launch of a product that helps you protect data stored in AI systems

Press Releases

Introducing Cloaked AI: The IronCore Labs encryption SDK for protecting AI embeddings in vector databases

Privacy and security concerns are some of the top reasons AI projects fail to launch, which is why companies are turning to Cloaked AI to protect sensitive AI data

Blogs

Forbes: AI Systems And Vector Databases Are Generating New Privacy Risks

With the right policies, questions and tools, organizations can take advantage of the transformative power of generative AI while also protecting sensitive customer data.

6 min read

Newsletters

Privacy Risks in Your AI Tech Stack

We take a look at some of the places where your AI systems might be vulnerable

Videos

How to address privacy needs across the AI tech stack

This is a recording of an ISSA webinar where IronCore Labs CEO Patrick Walsh walks through the AI tech stack from a privacy and security perspective followed by a Q&A with privacy lawyer and moderator Scott Giordano.

Newsletters

Harmful AI Myths and Misconceptions

We debunk some misconceptions about the security and privacy weaknesses of embeddings produced by an AI model

Blogs

"Embeddings Aren't Human Readable" And Other Nonsense

The research and breakthroughs in embedding inversion attacks make it clear that embeddings are, in fact, reversible back into forms that are fully human readable.

11 min read

Videos

How to protect sensitive data in generative AI systems

In this webinar, you’ll learn about modern AI systems and how to secure them, as well as an introduction to the role of vector embeddings and how to protect embeddings with encryption-in-use. Companies building AI systems on private data need to know how to keep the data safe without inhibiting the usefulness of new AI products

Videos

Post-quantum cryptography explained

Will quantum computers break cryptography? And what will happen once they do (yes, we see it coming)? In this talk, Patrick Walsh starts from the ground up and explains how developments in quantum computing are impacting cryptography standards and how we build software. He also discusses how the market is preparing and predicts how it will respond once the inevitable happens.

Videos

Software Resiliency in the Age of AI

In 8 minutes, you will feel the frustration of the nine T-mobile data breaches, the double-edged impact of data privacy regulations, and be introduced to the next wave of data security: protecting AI data. Find out how incentives are changing to pressure organizations and software developers to build more resilient software, especially as AI becomes a bigger part of the equation.

Videos

The Landscape of AI Security

AI has a security and privacy problem. What are people doing about it and which companies have created products that address each threat? In this video, we break down the landscape of products that protect AI systems, put them into a few buckets, and give examples of companies that are doing each of these things. Hopefully, this will help you understand what you should be thinking about as you build out production-ready AI systems that operate on private data.

Newsletters

AI Systems Have a Data Security Problem

We announce a new product to help secure sensitive data stored as embeddings produced by your AI model.

Press Releases

IronCore Labs launches beta for encrypting AI data

In response to mounting risks facing software companies with AI solutions, IronCore Labs announced a beta signup today for a first-of-its-kind product called Cloaked AI, which protects sensitive data stored in vector databases with encryption you won’t even notice, unless you’re a hacker.

Explainers

Security of AI embeddings explainer

Vector embeddings produced by machine learning tasks are a prime target for data theft. They're the memory of AI and just as sensitive as the data they derive from. Encrypting the sensitive data you store in vector databases is critical to protecting your company's sensitive data and reputation.

Blogs

Waitlist Now Open for New Encrypted AI Vector Embeddings Solution

Protecting the long term memory of AI is paramount as advanced capabilities become the norm.

3 min read

Videos

What are AI vector embeddings?

An overview of the vector embeddings produced by machine learning tasks, sometimes called the "memory of AI".

Blogs

Rethinking the broken complexity of cloud security

Modern infrastructure requires a modern approach to security by protecting what matters most: the data.

4 min read

Newsletters

Rethink Cloud Security

Complexity doesn't make things more secure! Think twice before piling on more and more security products.

Newsletters

New Data Sovereignty Product Feature

We have added a tagging feature to SaaS Shield to help you manage where encrypted keys are distributed.

Blogs

A Security Expert's Data Privacy Checklist

As a security professional, the top question I get is, "what do you do to protect your own privacy?" Here's what I recommend, along with a checklist at the end.

20 min read

Blogs

Top 3 Ways to Justify Encryption to the Business

How to explain the importance of data privacy and data security before introducing encryption in a conversation.

4 min read

Newsletters

Why Encryption Even Matters

We offer three ways to justify encryption to the business.

Newsletters

Six Cybersecurity Predictions for the New Year

Where is cybersecurity headed in 2023?

Blogs

6 Predictions for Cybersecurity in 2023

The hype machine is in full swing, but our predictions ignore the boloney and focus on what's likely.

8 min read

Videos

The Market for PETs

A tour of privacy enhancing technologies and a setup of where they fit into the picture of privacy and security and how individuals can or can't use them.

Blogs

Product Showcase: Searchable Encryption in Elasticsearch and OpenSearch

Help Net Security spotlights Cloaked Search and what security personnel need to know.

2 min read

Blogs

Meta Amasses $1B In GDPR Fines and Still Undeterred... For Now

Meta has had a bad year with privacy violations and sloppy data security coming home to roost. How bad is it? Really bad.

5 min read

Newsletters

NEW Features: Encrypted Data is Now Easier to Search On 🔍

Cloaked Search gets more powerful with new features and improved performance.

Press Releases

IronCore Labs Launches Advanced Searchable Encryption Features

Today IronCore Labs announced the release of its next generation of Cloaked Search, the encrypted search proxy that secures data in Elasticsearch and OpenSearch.

Blogs

OpenSearch Partner Highlight: Using Cloaked Search to Protect Your Data

The data in your OpenSearch indices can be a big security hole. IronCore's Cloaked Search can plug that hole without shutting down search on the data.

6 min read

Blogs

Forbes: How To Be Crypto-Agile Before Quantum Computing Upends The World

Change is coming to cryptography and some of that change will be extremely disruptive to the Internet and companies building software. Here's how to be ready.

6 min read

Press Releases

IronCore Labs Mentioned in Gartner® Report on Preparing for the Quantum World With Crypto-Agility

IronCore Labs announced today that Gartner® has identified the company as one of the vendors in the public key infrastructure (PKI) and cryptography space in the 2022 report "Preparing for the Quantum World With Crypto-Agility."

Newsletters

Why Transform Encryption Is Better

Encrypt to groups with policy-driven encryption that works end-to-end.

Blogs

How To Neutralize Toxic Data In Custom Fields

Custom fields are a mainstay in B2B software, but they are often abused by customers who store sensitive data in them. Encrypting these fields reduces risk from privacy and security failures.

4 min read

Explainers

Crypto-agility / post quantum cryptography explainer

Crypto-agility is the best way to prepare for quantum computers and post-quantum cryptography

Newsletters

Encrypt Your Toxic Data

Neutralizing toxic data in custom fields protects you and allows your customers to do more with your product.

Blogs

Key Management R Hard

Providing advanced encryption to all your customers is a win-win.

5 min read

Newsletters

The U.S. Is Living Through A Digital Privacy Catastrophe

The U.S. lags behind the world, and we need a nationwide privacy law now more than ever.

Blogs

Forbes: We're Living Through A Digital Privacy Catastrophe: It’s Past Time For A Serious Nationwide Privacy Law

Companies can do almost anything they want with our digital data, including selling it to the U.S. government.

6 min read

Newsletters

How to Future-Proof Your Encryption

Learn how to be crypto-agile so you can build cryptographic resiliency in the age of quantum computers.

Blogs

How To Be Crypto-agile: Building Cryptographic Resiliency In The Age Of Quantum Computers

Crypto-agility is an approach that allows you to pivot quickly when post-quantum computing becomes a reality.

11 min read

Videos

Encrypted Search and Blind Indices Explained

Bob and Patrick talk about encrypted search and how it's different from what most people think of as encrypted data in a search system.

Newsletters

The Rise of Encryption Around the World

Learn about two technical measures that satisfy Schrems II with encryption.

Videos

Privacy Regulations, GDPR, and Schrems II

Patrick and Riah talk about modern global privacy laws and the challenges of handling personally identifiable information (PII).

Videos

Constant Time Crypto Explained

Colt and Patrick talk about constant time code, what it is, and why it's important in cryptography.

Videos

Why Use Application-layer Encryption (ALE)

Patrick and Wendy talk about application-layer encryption (ALE), what it is, and why it's important.

Videos

End-to-end Encryption and Private Key Rotation

Bob and Craig talk about how IronCore solves problems like needing to encrypt to users who haven't yet set up their keys and how to rotate private keys.

Videos

Proxy Re-encryption Explained

Bob and Colt talk about what Proxy Re-encryption is and some of the benefits and applications of the technology.

Videos

IronCore Labs' Founders Interview

Bob and Patrick talked about why they started IronCore Labs and what makes it meaningful.

Blogs

Forbes: The Rise Of Encryption In A Schrems II World

Companies can do almost anything they want with our digital data, including selling it to the U.S. government.

6 min read

Newsletters

Are You Ready For Schrems III?

These technical measures allow U.S. companies to comply now instead of waiting for the next framework to be dismantled

Blogs

What You Need To Know About The New Trans-Atlantic Data Privacy Framework

How U.S. companies should think about this new proposed replacement for the EU-U.S. Privacy Shield Framework.

9 min read

Blogs

The Trouble With FIPS: Encryption Standards Need a Makeover

FIPS 140 sets the standard for cryptography used in the United States, but it's got problems. Because of FIPS, we all have problems.

17 min read

Blogs

Announcing Our Startup Program

Why It’s Important for Startups to Build Right From the Beginning

5 min read

Press Releases

Startups Get Two Years Free Access To Encryption Tools With New IronCore Labs Startup Program

The IronCore Labs Startup Program Offers Free Multi-tenant Encryption to Qualified Startups For Two Years

Newsletters

Startups Get Two Years Free

The new IronCore Labs Startup Program helps startups address data security challenges early on.

Videos

Cloaked Search Getting Started Walkthrough | How To Search Over Encrypted Data

Patrick walks through the "Try Me" repo steps to show you how to locally install and use Cloaked Search to encrypt data flowing to Elasticsearch and OpenSearch.

Newsletters

6 Trends I'm Predicting For 2022

Here's what's trending and what's overly hyped up, plus why encryption at rest is crap.

Videos

Encryption At Rest Is Crap

The bottom line is this: encryption at rest doesn't tell you if the data is protected.

Blogs

A Contrarian's 2022 Tech Predictions

Once again, we'll see a huge rift between the hype and what the press covers versus where the real momentum is building.

9 min read

Newsletters

AppSec Best Practices For 2022

Security vulnerabilities are a given and can exist for more than 10 years before they're discovered. Here are AppSec best practices.

Blogs

AppSec Fails and the Incredible Durability of Application Vulnerabilities

As companies mature, they often look to increase their application security. But more often than not, they ignore one critical piece.

6 min read

Newsletters

Infographic: How To Get Started With ALE

Step-by-step guide on getting started with application-layer encryption.

Videos

How to Secure Your Sensitive Data in Elasticsearch and OpenSearch

Learn why and how to use encrypted search to protect sensitive data stored in Elasticsearch or OpenSearch. Watch the webinar replay.

Blogs

Infographic: How to Get Started With Application-layer Encryption

Application-layer encryption (ALE) is the best way to keep the data you hold safe, but there are a lot of pitfalls to doing it yourself from scratch, which is why few companies have historically used ALE. Thankfully, that's changing as it becomes more accessible.

3 min read

Press Releases

Companies Can Now Search Encrypted Data With IronCore Labs' New Cloaked Search Product

IronCore Labs announced today the launch of Cloaked Search, a drop-in encrypted search solution to protect sensitive data held in existing search services, and a partnership with OpenSearch, a community-driven, open-source search service.

Blogs

Solving Search Over Encrypted Data

Encrypting data turns it "dark", but data is most useful when you can find it. And that's where encrypted search comes in.

7 min read

Blogs

An Open Letter to Apple: Please, Please Replace Objective-C with Rust

Your iOS 15.1 update fixes 22 vulnerabilities. Thank you. But here’s the thing: of those twenty-two, at least sixteen of them were due to memory bugs.

3 min read

Newsletters

How to Secure Sensitive Data in Elasticsearch and OpenSearch

Let's talk application-layer encryption and encrypted search.

Blogs

A Checklist to Quickly Evaluate SaaS Security

You don't need extensive infosec reviews to gauge the relative maturity of a SaaS company's security. You just need their website.

6 min read

Blogs

Application-Layer Encryption Defined

It's a simple concept made complicated by security vendors. We dispel the fog of B.S. in this mini-blog.

5 min read

Newsletters

What You Need to Know About SaaS Security Layers

Most SaaS solutions aren't properly layered to protect sensitive data from even the most common attacks.

Blogs

The Lack of Security Layers in SaaS

SaaS apps are systemically under-protected with laughably few layers to prevent a catastrophic breach.

7 min read

Blogs

An Unpopular Opinion: Apple's CSAM Detection Is A Net Good

I don't agree with the "slippery slope" and "backdoor" arguments

16 min read

Videos

SaaS Shield Configuration Management Demo

A walk-through of the SaaS vendor and SaaS customer experience setting up customer managed keys.

Blogs

How the Cyber Insurance Industry Can Stop Ransomware

Cyber Insurers can help the tech industry level-up their security. If they want to.

8 min read

Newsletters

Encrypted Search & Critiquing Cyber Insurance

Learn about Cloaked Search and find out why the insurance industry should be doing more to stop ransomware.

Newsletters

Compelled Access Complicated Privacy

Government requests to Amazon for customer data rose by 472% in 2020.

Explainers

Application-layer encryption explainer

Application-layer encryption is the best way to protect data from hackers that get past your firewall or find a vulnerability in your application.

Newsletters

Your App Needs Better Encryption

Government requests to Amazon for customer data rose by 472% in 2020.

Blogs

Why Your SaaS App Needs Better Encryption

You can't afford to have customer data leak

5 min read

Newsletters

Sensitive Data Will Bite You In The Ass

Do you know how much it costs per GB of data when your data is breached?

Newsletters

The Cost of Data in 2021

Have you considered the economic impact of holding data?

Blogs

Evaluating Newly Proposed Privacy Regulations

New privacy laws are popping up like mushrooms here in the U.S., which we love to see. But it can be hard to tell whether these proposed laws are meaningful or not.

7 min read

Blogs

SaaS Security: How To Handle Sensitive Data

Why SaaS Companies Should Offer Customer Managed Keys

8 min read

Podcasts

Lies You've Been Sold About Encryption

Jonathan and Mike welcome Patrick Walsh, CEO of IronCore Labs, to discuss transparent data encryption, data access and privacy, security in-depth, and how companies today are facing these challenges.

Blogs

The New Economics of Holding Personal Data in 2021

Hidden penalties buried in CCPA will radically change the cost of the next big data breach.

6 min read

Press Releases

IronCore Launches Customer Managed Keys for Amazon S3 in AWS Marketplace

B2B SaaS Businesses Can Now Protect Files in Amazon S3 With Customer Managed Keys (CMK) from IronCore Labs.

Newsletters

Free Trial: CMK in AWS Marketplace

Get a free trial of our new CMK product now available in AWS Marketplace.

Blogs

What Ring Got Wrong With End-to-End Encryption

We'll dig into what they did, from usability through to the cryptographic choices they made.

13 min read

Podcasts

IronCore's Call To Arms

Hosts Alex and Robb discuss CEO Patrick Walsh's recent Colorado Sun op-ed calling for our politicians to fix our nation's cybersecurity infrastructure.

Videos

ISSA Webinar: Pseudonymization vs. Encryption: Fight!

The user data you hold is now toxic -- meaning the penalties for losing control of that data are now potentially very costly. Technical measures must be taken to protect the privacy of that user data, which means you probably need to adopt a PET. But what PET is appropriate?

Press Releases

OPINION: Huge Cyberattack Shows It's Time To Fix Our Failing Cybersecurity Infrastructure

This op-ed originally ran in the Colorado Sun and advocates for a better approach to our nation's critical cybersecurity infrastructure.

Blogs

Opinion: Huge cyberattack shows it's time to fix our failing cybersecurity infrastructure

We live in an age of asymmetric cyber warfare where even small teams of attackers have an advantage over large and well-funded defenders.

6 min read

Newsletters

Infographic: The CMK Industry Guide

Many variations of CMK exist within the industry, so we built an infographic comparing some of these approaches.

Blogs

Infographic: The Customer Managed Keys Buyer's Guide

More and more enterprises are offering customer managed keys (CMK), but not all CMK are created equal. This infographic compares CMK available from different companies.

7 min read

Newsletters

Do you have a 2021 Privacy Strategy?

Full trust is not only losing popularity, it's also costing companies millions in data breaches and fines.

Videos

SaaS Shield CMK for Amazon S3 - Demo Video

Watch a demo of SaaS Shield Customer Managed Keys for Amazon S3.

Blogs

Privacy Was On The Ballot

The voters have spoken and they want laws protecting their privacy. Four states made progress this cycle.

6 min read

Explainers

Technical measures for GDPR and Schrems II explainer

Encryption offers a peace-of-mind solution in a time when data privacy laws like GDPR are evolving and international transfers are being challenged as with Schrems II.

Newsletters

What Is Strategic Privacy?

A host of companies have recently been investing in privacy and leading their sectors with strategic privacy.

Newsletters

End-to-end Encryption Deep Dive

Get our latest eGuide on E2EE for video conferencing platforms and learn more about a new product releasing soon.

Explainers

The End-to-End Encryption Guide for Video Conferencing Platforms

An in-depth, technical look at how to make E2EE a reality for your video conferencing platform.

Videos

What Zoom Got Wrong With End-to-end Encryption

Find out what E2EE is and what it is not as we discuss the Zoom case study.

Blogs

Free Tool for Startups Getting SOC 2 Certified

IronCore Labs' team developed a SOC 2 internal dashboard tool that's available for public use.

3 min read

Newsletters

Let's Talk About Zoom

What did Zoom get wrong with end-to-end encryption? A lot.

Videos

Choosing Rust - a Presentation by Clint Frederickson

Clint introduces some of the differentiating factors of Rust with a focus on the language's revolutionary "data ownership" concept.

Blogs

How to Handle EU Data Without the EU-US Privacy Shield Framework

Three Technical Approaches to Handling EU Data Without Privacy Shield

11 min read

Newsletters

Twitter Has an Insider Threat Problem

Software companies need to rethink everything about employee access.

Blogs

The Cloud Needs More Sunshine

Twitter is just the most recent reminder of how broken the cloud remains

5 min read

Videos

Why SaaS Businesses Are Turning to Customer Managed Keys

CMK is a privacy feature that gives customers control of their encryption keys.

Newsletters

Announcing Encrypted Search & New Platforms

How our products address modern privacy challenges and the CMK webinar.

Press Releases

IronCore Labs Announces New Data Privacy Product Features

Businesses with sensitive customer data look to IronCore Labs to empower application developers with SDKs for easy-to-implement encryption and customer-managed keys.

Blogs

New Ways to Address Modern Privacy Challenges

An IronCore Labs Product Update

10 min read

Blogs

Rally Software Leads the Industry in Data Privacy With Customer Managed Keys

Customers want data control, and with IronCore Labs, that's what Rally offers

7 min read

Blogs

Deidentifying Data: The Fool's Trap

Re-identification is trivial by joining other data sets

6 min read

Blogs

SaaS Trust Models for Security and Data Privacy

You can't compare the privacy of SaaS offerings until you understand their trust model.

8 min read

Blogs

Insights From Slack and Salesforce: Grow Your SaaS With Premium Data Privacy

Early adopters of premium data privacy are doing well. Here's one reason why.

7 min read

Videos

SnowFROC 2020 - Rethinking the Enterprise Perimeter

The function of security tends to rest in IT and this drives a network-centric view of security. Partners' security is evaluated based on their perimeter controls and perimeter controlling technologies like IDS, firewall, and DLP, are the heart of data protection strategy today, but these strategies don't work in a world where data is everywhere, shared with many partners, scattered amongst vendors, and with development teams constantly building new things that access the data. But new tools are available for a zero-trust data world including BYOK, modern cryptographic access control, privacy and security by design application stacks, and more. This talk is a survey of the next generation of Enterprise security in complex environments.

Blogs

Warning: SaaS Privacy Debt Will Crush Your Roadmap

An open letter on why kicking the can down the road is catastrophic for the future of software

5 min read

Videos

Transform Crypto Overview

An explainer breaking down Transform Cryptography and its relation to Proxy Re-encryption.

Blogs

How SaaS Companies Avoid Compelled Access With Encryption

A Look at Trust, Corporate Data, Government Prying, and Practical Defenses

14 min read

Blogs

Welcome to the Revolving Door of Personal Data

Why Clearview AI even exists: U.S. government sells data to industry and then buys it back using a warrantless search loophole

5 min read

Blogs

Highlights From Real World Crypto 2020

Things that made us go, "hmmmmmm"

14 min read

Blogs

Agile Approaches to Privacy and Security for SaaS Vendors

Highlights From the Agile Amped Podcast With Rob Pinna and Leslie Morse

8 min read

Podcasts

Baking Privacy and Security into the Technical Architecture

Rob is a 30-year high-tech veteran who is the Chief Product Officer at IronCore Labs. His passion is protecting the privacy of data stored in the cloud. Pinna says we shouldn't build software and then make it secure. Instead, you want to bake privacy and security into the technical platform. That way the system is designed so that developers automatically just do the right thing. The conversation covers how complex it is to both provide security and privacy early and often, as well as deliver at a large enterprise.

Explainers

Bring Your Own Keys (BYOK): An Overview

Bring Your Own Keys, or BYOK, is a cloud architecture that gives customers ownership of the encryption keys that protect some or all of their data stored in SaaS applications.

Podcasts

Colorado = Security Podcast Interview

Starting at around minute 22, an interview with IronCore CEO Patrick Walsh.

Blogs

IronHide: Better Team Encryption

A few months ago, we quietly released a little utility that brings the power of proxy re-encryption to the command line. Proxy…

7 min read

Videos

IronHide Demo

How to use the `ironhide` command line tool to protect and share files.

Explainers

CMK: What Architects Need to Know

A white paper on Customer Managed Keys

Videos

IronCore Uses Coalfire for SOC2 Audit

Director of Operations Trevor Zylstra discusses IronCore's experience with Coalfire.

Blogs

Military Grade Encryption

And other security marketing bullshit

6 min read

Blogs

CCPA: What You Need to Know

The California Consumer Privacy Act takes effect on January 1st, 2020. If you're a dev or work for a software company, this affects you.

7 min read

Explainers

CCPA: What You Need To Know

A white paper on California's new data privacy law.

Press Releases

IronCore Is Now SOC 2 Certified

We have successfully completed the Service Organization Control audit known as SOC 2 Type 1.

Blogs

IronCore Is Now SOC 2 Certified

We are proud to announce that we have successfully completed the Service Organization Control audit known as SOC 2 Type 1. SOC 2 is a…

3 min read

Explainers

Data Control White Paper

An introduction to the principles of data control, what it means, and how to use it.

Videos

ngAir 181

Policy-Based Client-Side Encryption in Angular with Robert Pinna

Blogs

Policy-Based Client-Side Encryption in Angular

And How To Fix It

13 min read

Blogs

DoD's Distributed Data Problem

And How To Fix It

8 min read

Press Releases

IronCore Labs Proxy Re-Encryption Library Audit by NCC Group

We hired a well-respected third-party with a stellar reputation, NCC Group, to review our implementation.

Blogs

IronCore Labs Proxy Re-Encryption Library Audit by NCC Group

We believe there's a right way to do things. With cryptography, that's even more important than almost any other area of software, save…

6 min read

Videos

DEF CON 26: Implementing a Library for Pairing-based Transform Cryptography

IronCore CTO Bob Wall and Senior Engineer Colt Frederickson discuss the challenges of building open source proxy re-encryption tools at DEF CON 26.

Blogs

IronCore's Privacy Platform Helps Developers Unlock Enterprise Sales

Today, security and privacy scandals flood the news, and customers are demanding to know who can access their data, who that data is shared…

2 min read

Press Releases

IronCore Announces Additional $1.5M in Seed Funding

IronCore is changing the way people and organizations think about data in the cloud.

Explainers

Cryptographically Enforced Orthogonal Access Control at Scale

ACM SCC '18 Proceedings of the 6th International Workshop on Security in Cloud Computing.

Videos

How IronCore Works

This video explains how IronCore works, and how it benefits your company. IronCore is a service that implements data control, privacy, and security into your application.

Blogs

Mastering Emotion in Marketing Copy

A tale of three books with an unexpected intersection

10 min read

Blogs

How Not To Handle a Breach

Equifax Shows the Way

7 min read

Blogs

Audit Your S3 Storage Immediately

A Quick and Dirty Guide

7 min read

Videos

Stop Expecting Magic Fairy Dust: Be Secure By Design

Software developers are screwing up the digital world. Security is often an afterthought, or worse, the job of I.T., who is expected to sprinkle magic fairy dust on an app that magically makes it secure.

Blogs

The Proliferation of Under-protected OAuth Tokens

The Hidden Cost of Cloud Management Services and Integrations

4 min read

Videos

Ironcore Labs Techstars Boulder 2017 Demo Day

Patrick Walsh, CEO of IronCore Labs, talks about the massive opportunity to help SaaS vendors kill on-prem competitors at the Techstars Boulder 2017 Demo Day event.

Press Releases

Announcing "Customer-Controlled Data"

A big step for Customer Managed Keys and a giant leap forward for cloud software.

Blogs

Announcing "Customer-Controlled Data"

A big step for Customer Managed Keys and a giant leap forward for cloud software

6 min read

Blogs

How the 4th Amendment Is Bypassed

The U.S. Constitution doesn't pull any punches. The Government does not have the right to sift through the communications or property of…

6 min read

Blogs

Baby Steps with NY's New Financial Cybersecurity Regs

Banks, insurance companies and other financial services companies in New York will soon be subject to new, stronger regulations around…

3 min read

Blogs

Quantum is the New Global Arms Race

China Takes the Lead

6 min read

Blogs

Bits, Banks and Burglars

What Happens When Digital Currency Is Stolen

8 min read

Videos

The Internet is a dog-eat-dog world

IronCore CTO Bob Wall talking about security at Big Sky Dev Con 2016.

Blogs

The Worsening State of Application Security

At the Defcon conference last year, I was struck by the simplicity of most of the hacks that were being described. Five years ago, most of…

6 min read

Blogs

The Inevitable Demise of Perimeter Security

Computer security today follows classic real-world military approaches: make a perimeter; fortify that perimeter; ensure that only…

9 min read