Anjuna Blog

Most Recent Article

Anjuna’s Mission: To Go Where No Data Security Offering Has Gone Before

In my last post, I talked about how and why we formed the company. I discussed how we came face-to-face with the computing flaw at the heart of...

Subscribe to our Blog

    | 3 MINUTE READ

    Anjuna’s Mission: To Go Where No Data Security Offering Has Gone Before

    In my last post,I talked about how and why we formed the company. I discussed how we came face-to-face with the computing flaw at the heart of...


    | 2 MINUTE READ

    Why We Started Anjuna (It's Been a Long Time Coming...)

    This week, we announced the launch of Anjuna Enterprise Enclaves—a simple and secure data security solution. While Anjuna Security was founded in...


    | 2 MINUTE READ

    Plundervolt

    On June 7, 2019, academics from the universities of Birmingham, Graz and Leuven disclosed to Intel® the Plundervolt attack, tracked by Intel® as ...


    | 4 MINUTE READ

    Compiler-based Techniques for Enhancing Performance and Privacy in Enclaves

    I’ve been collaborating for a while with the ACSL research lab at the Technion and this collaboration has resulted in the recent publication of...


    | 2 MINUTE READ

    Securing Applications On Bare-metal Instances

    Conventional approaches to securing applications have relied primarily on software to provide protection. However good the software implementation...


    | 3 MINUTE READ

    Protecting Byzantine Fault Tolerance with Trusted Execution

    You might be familiar with non-BFT consensus protocols like Paxos and Raft. These protocols can tolerate crash failures in up to 1/2 of the nodes,...


    | 2 MINUTE READ

    How Do You Avoid the Facebook Passwords Security Issue and Protect Your Customers’ Secrets?

    ‘Krebs on Security’ recently published that hundreds of millions of Facebook users had their account passwords stored in plain text and searchable...


    | 3 MINUTE READ

    Runtime Protection for Secrets Management

    Hashicorp Vault is one of the most popular secrets-management solutions. It helps manage secret parameters, cryptographic keys and...


    | 1 MINUTE READ

    Runtime Protection for Vault and Consul

    Anjuna presented as part of the first HashiTalks online event—A 24-hour continuous series of presentations from the worldwide HashiCorp User Group...


    | 2 MINUTE READ

    Container Security Holes

    We can’t think of a better way to put it then the ZDNet article [1]:

    One of the great security fears about containers is that an attacker could...


    | 4 MINUTE READ

    Why Protection Against Root Users Is Important

    Security company Qualys has recently disclosed vulnerabilities in Linux’s Systemd, the default service manager daemon for many Linux...

    | 13 MINUTE READ

    SGX, or How I Stopped Worrying About the Microchip Hack

    Bloomberg Businessweek had recently reported on a hardware supply chain allegedly infiltrated by government sponsored hackers, who, according to...