Anjuna Blog

Most Recent Article

Anjuna Enterprise Enclaves Now Available for Redis

Users of Redis now have a simple way to prevent insiders or bad actors from gaining unauthorized access to Redis databases through infrastructure...

Subscribe to our Blog

    | 1 MINUTE READ

    Anjuna Enterprise Enclaves Now Available for Redis

    Users of Redis now have a simple way to prevent insiders or bad actors from gaining unauthorized access to Redis databases through infrastructure...


    | 2 MINUTE READ

    Plundervolt

    On June 7, 2019, academics from the universities of Birmingham, Graz and Leuven disclosed to Intel® the Plundervolt attack, tracked by Intel® as ...


    | 4 MINUTE READ

    Compiler-based Techniques for Enhancing Performance and Privacy in Enclaves

    I’ve been collaborating for a while with the ACSL research lab at the Technion and this collaboration has resulted in the recent publication of...


    | 2 MINUTE READ

    Securing Applications On Bare-metal Instances

    Conventional approaches to securing applications have relied primarily on software to provide protection. However good the software implementation...


    | 3 MINUTE READ

    Protecting Byzantine Fault Tolerance with Trusted Execution

    You might be familiar with non-BFT consensus protocols like Paxos and Raft. These protocols can tolerate crash failures in up to 1/2 of the nodes,...


    | 2 MINUTE READ

    How Do You Avoid the Facebook Passwords Security Issue and Protect Your Customers’ Secrets?

    ‘Krebs on Security’ recently published that hundreds of millions of Facebook users had their account passwords stored in plain text and searchable...


    | 3 MINUTE READ

    Runtime Protection for Secrets Management

    Hashicorp Vault is one of the most popular secrets-management solutions. It helps manage secret parameters, cryptographic keys and...


    | 1 MINUTE READ

    Runtime Protection for Vault and Consul

    Anjuna presented as part of the first HashiTalks online event—A 24-hour continuous series of presentations from the worldwide HashiCorp User Group...


    | 2 MINUTE READ

    Container Security Holes

    We can’t think of a better way to put it then the ZDNet article [1]:

    One of the great security fears about containers is that an attacker could...


    | 4 MINUTE READ

    Why Protection Against Root Users Is Important

    Security company Qualys has recently disclosed vulnerabilities in Linux’s Systemd, the default service manager daemon for many Linux...

    | 13 MINUTE READ

    SGX, or How I Stopped Worrying About the Microchip Hack

    Bloomberg Businessweek had recently reported on a hardware supply chain allegedly infiltrated by government sponsored hackers, who, according to...

    | 2 MINUTE READ

    Foreshadow

    Security researchers from KU Leuven, Technion, University of Michigan and University of Adelaide, have recently published their findings on an...