Banner image


Our information security research program explores new techniques for securing data in modern IT environments


Horizons explores and prototypes new data security technologies and techniques, particularly in distributed cloud environments. Findings are shared publicly, whenever possible, to further the advancement of the information security community.

Our Projects


Threshold Signature

RSA signing with multi-party computation



License to Clone

Lightweight licensing for software agents


Open Source Contributions







Our People

Sol Cates image

Sol Cates

VP Technical Strategy

As a child, Sol Cates liked to learn how things worked by taking them apart. Computers piqued his interest for the same reason – he could use his hands to explore them and figure them out. Sol credits his constant curiosity for leading him into a cyber security career that now stretches past 20 years.

During that time, he has been a vendor, administrator, CISO, CTO, CIO, security analyst, developer, and architect, among other roles. Sol’s current role as technology strategy vice president for Thales is a career highlight because it allows him the ability to solve the problems that he and his peers wrestle with every day.

“It’s very rewarding to understand a problem that your customers experience, and then design, build and innovate the right solution to the real problem,” Sol says.

His childhood might have presaged one professional distinction he earned. At former employer Tripwire, Sol was awarded the inaugural and only MacGyver Award, a nod to his unconventional yet resourceful thinking.

“I hope it wasn’t a comment on my coding style,” Sol jokes.

Our Blogs

March 24, 2020
Bitslicing for Constant Time Cryptography

Bitslicing is a software implementation strategy for achieving constant time cryptographic algorithms to prevent cache and timing side-… Read More

March 24, 2020
Identity-based cryptography

Public key infrastructure (PKI) requires key distribution and has been long criticised for its usability issues [13,14,15]. In an… Read More

September 16, 2019
We need to talk about Go

I love the Go programming language. It’s easy to use, concise and powerful. These characteristics appeal to the typical programmer’s… Read More

June 3, 2019
Quantum-Resistant TLS in Go

Quantum computing attacks may have already begun. Confidential data is being exchanged using algorithms that will eventually be broken… Read More

May 13, 2019
Going Native with Kubernetes Operators

With an increasing shift to micro-services architectures, the ecosystem seems to be in a steady cycle of increasing complexity, followed… Read More

Engineering Secure Systems
Andrew Mobbs April 17, 2019
Engineering Secure Systems


The word “system” comes from the Greek σύστημα, a whole thing made of parts, or a composition. When we discuss the… Read More