“Advancing progress toward a technology environment where all software products are safe and secure by design is a top priority for the U.S. Cybersecurity & Infrastructure Security Agency (CISA), the more
Trustworthiness, and confidence in that trustworthiness, are essential aspects of cyber-physical systems. Inattention to trustworthiness can lead to loss of human life, long-term environmental impacts more
For golf enthusiasts, April is best known for the prestigious Masters Tournament held annually at Augusta National Golf Club in Augusta, Georgia, USA. Since 1934, the Masters Tournament has been home more
Software scalability is a key aspect for a sustainable business model that aligns with current needs as well as future potential. With an agile software licensing scheme, organizations can readily ena more
Supervisory control and data acquisition systems (SCADA) came into play in the 1970’s with the emergence of microprocessors and PLCs as mechanisms to control and monitor automated processes. In the ea more
In 1989, Wibu-Systems was founded on the premise to deliver innovative technology for the protection and security of digital assets. That premise was realized with WibuKey and embodied in the company’ more
Your software business is booming but what happens when unexpectedly your customer’s business spirals out of control? Consider this hypothetical situation: An ISV has developed a software solution tha more
Certificates are used to prove the authenticity and identity of users or devices on the Internet, in emails, for machine-to-machine communication, and elsewhere. A commonly used certificate is an X.50 more
The security and integrity of mission critical software, particularly software used by governments or for controlling critical infrastructure, is under intense scrutiny for its trustworthiness and the more
Subscription software licensing is gaining traction in nearly every business sector from e-commerce models to enterprise business applications to niche vertical software solutions. In IDC’s Worldwide more
Dongles – The Historical "Bad Rap" When describing software protection dongles in a 2007 article appearing in PC Magazine , John C. Dvorak, a well-respected (but self-described curmudgeon) and award w more
We talk a lot about copy protection in this space but what I want to focus on today is what is meant by the phrase "secure software licensing." Let's unpack the term and look at each component separat more
Anytime you add a 3rd party component into your overall product stack you need to be thoughtful before you decide. Copy protection software is no different: it's something you will rely on to protect more
Hackers are out there. So you can't take for granted--now or ever--that it won't happen to you. Achieving software security is a complex problem; what's amazing to me is how often the bad guys get in more
There are plenty of reasons to use a software protection dongle even when you're running an embedded system. Some people believe that embedded systems are immune to piracy because the software has to more
The world is flat. Thomas Friedman argues in his classic work that modern telecommunications makes global trade and competition a simple fact of modern life. And so you need flat earth software licens more
All is not well within today’s pharmacist community. Several recent reports have documented the growing pressures brought on by increasing workloads with limited resources, time, and staffing. During more
If you have decided to integrate a 3rd party licensing solution for your software application, you’ve made the right choice. By doing so, you’ve freed up your developers to do what they do best — writ more
Software for embedded systems is based more and more on open system platforms – Linux Embedded, VxWorks , Windows Embedded, QNX and many others. In addition to powerful core functionality, one of the more
"Attackers — in ever greater numbers and with increasing sophistication — see, in the growing promise of our tech-connected world, opportunities to steal or cause major disruption or destruction by ex more