Anjuna Blog

Most Recent Article

Anjuna Announces Support for Redis

Anjuna Enterprise Enclaves™ secures Redis open source databases by default PALO ALTO, Calif., Sept. 15, 2020  -- Anjuna Security, a leader in...

Subscribe to our Blog

    | 9 MINUTE READ

    Anjuna Announces Support for Redis

    Anjuna Enterprise Enclaves™ secures Redis open source databases by default

    PALO ALTO, Calif., Sept. 15, 2020  -- Anjuna Security, a leader in...


    | 1 MINUTE READ

    DarkReading: The Fatal Flaw in Data Security

    In this post for DarkReading, Anjuna CEO and co-founder Ayal Yogev demonstrates cyber security's fatal flaw: data cannot be simultaneously used...


    | 1 MINUTE READ

    Vinton Cerf: Confidential Computing is a Game Changer

    Vinton Cerf, the father of the Internet, talks about why confidential computing is a transformational technology that should be part of every...


    | 3 MINUTE READ

    Anjuna’s Mission: To Go Where No Data Security Offering Has Gone Before

    In my last post,I talked about how and why we formed the company. I discussed how we came face-to-face with the computing flaw at the heart of...


    | 2 MINUTE READ

    Why We Started Anjuna (It's Been a Long Time Coming...)

    This week, we announced the launch of Anjuna Enterprise Enclaves—a simple and secure data security solution. While Anjuna Security was founded in...


    | 1 MINUTE READ

    Anjuna Closes Long Existing Enterprise Data Security Gap

    Anjuna Enterprise Enclaves build on industry momentum and new CPU technology to lay groundwork for new era of secure computing

    PALO ALTO CA— A...


    | 1 MINUTE READ

    Anjuna Enterprise Enclaves Now Available for Redis

    Users of Redis now have a simple way to prevent insiders or bad actors from gaining unauthorized access to Redis databases through infrastructure...


    | 2 MINUTE READ

    Plundervolt

    On June 7, 2019, academics from the universities of Birmingham, Graz and Leuven disclosed to Intel® the Plundervolt attack, tracked by Intel® as ...


    | 4 MINUTE READ

    Compiler-based Techniques for Enhancing Performance and Privacy in Enclaves

    I’ve been collaborating for a while with the ACSL research lab at the Technion and this collaboration has resulted in the recent publication of...


    | 2 MINUTE READ

    Securing Applications On Bare-metal Instances

    Conventional approaches to securing applications have relied primarily on software to provide protection. However good the software implementation...


    | 3 MINUTE READ

    Protecting Byzantine Fault Tolerance with Trusted Execution

    You might be familiar with non-BFT consensus protocols like Paxos and Raft. These protocols can tolerate crash failures in up to 1/2 of the nodes,...


    | 2 MINUTE READ

    How Do You Avoid the Facebook Passwords Security Issue and Protect Your Customers’ Secrets?

    ‘Krebs on Security’ recently published that hundreds of millions of Facebook users had their account passwords stored in plain text and searchable...