Align authority with ownership restore confidence in infrastructure Enable agile, rapid, and easy collaboration At SpiderOak, we believe in protecting the world’s data. SpiderOak has developed technology that allows for the instant provisioning of cryptographically secure collaboration spaces for use in scenarios where certainty about who has access to that…
CyberSecurity —What Needs to Change
At its core, the current client-server architecture is broken. In today’s applications, the server is at the center of trust and authority. To trust the server, you have to trust the millions of lines of code that form these servers and the operating systems they depend on. Far worse, we…
SpiderOak’s Trusted Application Platform
A secure software platform for effortlessly building communication and collaboration software in mission-critical environments. Software for Mission Critical Collaboration Meeting the mission needs in the modern world requires tools that enable collaboration, communication, and coordination with greater ease and flexibility. These tools need to not just serve individual teams but…
What Is a Supply Chain Attack?
This article was originally written in 2017. We all know the story of the Trojan horse. What we don’t know is why the Trojans didn’t take the horse and lock it in a room for a week, flood it, and then haul it out in the town square once they…