Banner image

Horizons

Our information security research program explores new techniques for securing data in modern IT environments

#ThalesHorizons

Horizons explores and prototypes new data security technologies and techniques, particularly in distributed cloud environments. Findings are shared publicly, whenever possible, to further the advancement of the information security community.

Our Projects

threshhold

Threshold Signature

RSA signing with multi-party computation

 

signature

License to Clone

Lightweight licensing for software agents

image

Open Source Contributions

22

Projects

115

Commits

35043

Lines

Our People

Sol Cates image

Sol Cates

VP Technical Strategy

As a child, Sol Cates liked to learn how things worked by taking them apart. Computers piqued his interest for the same reason – he could use his hands to explore them and figure them out. Sol credits his constant curiosity for leading him into a cyber security career that now stretches past 20 years.

During that time, he has been a vendor, administrator, CISO, CTO, CIO, security analyst, developer, and architect, among other roles. Sol’s current role as technology strategy vice president for Thales is a career highlight because it allows him the ability to solve the problems that he and his peers wrestle with every day.

“It’s very rewarding to understand a problem that your customers experience, and then design, build and innovate the right solution to the real problem,” Sol says.

His childhood might have presaged one professional distinction he earned. At former employer Tripwire, Sol was awarded the inaugural and only MacGyver Award, a nod to his unconventional yet resourceful thinking.

“I hope it wasn’t a comment on my coding style,” Sol jokes.

Our Blogs

oranges
March 24, 2020
Bitslicing for Constant Time Cryptography

Bitslicing is a software implementation strategy for achieving constant time cryptographic algorithms to prevent cache and timing side-… Read More

March 24, 2020
Identity-based cryptography

Public key infrastructure (PKI) requires key distribution and has been long criticised for its usability issues [13,14,15]. In an… Read More

viruses
September 16, 2019
We need to talk about Go

I love the Go programming language. It’s easy to use, concise and powerful. These characteristics appeal to the typical programmer’s… Read More

key
June 3, 2019
Quantum-Resistant TLS in Go

Quantum computing attacks may have already begun. Confidential data is being exchanged using algorithms that will eventually be broken… Read More

author
May 13, 2019
Going Native with Kubernetes Operators

With an increasing shift to micro-services architectures, the ecosystem seems to be in a steady cycle of increasing complexity, followed… Read More

Engineering Secure Systems
Andrew Mobbs April 17, 2019
Engineering Secure Systems

Systems

The word “system” comes from the Greek σύστημα, a whole thing made of parts, or a composition. When we discuss the… Read More