Banner image


Our information security research program explores new techniques for securing data in modern IT environments


Horizons explores and prototypes new data security technologies and techniques, particularly in distributed cloud environments. Findings are shared publicly, whenever possible, to further the advancement of the information security community.

Our Projects


Threshold Signature

RSA signing with multi-party computation


License to Clone

Lightweight licensing for software agents

View all


Open Source Contributions






Sol Cates image

Sol Cates

VP Technical Strategy

As a child, Sol Cates liked to learn how things worked by taking them apart. Computers piqued his interest for the same reason – he could use his hands to explore them and figure them out. Sol credits his constant curiosity for leading him into a cyber security career that now stretches past 20 years.

During that time, he has been a vendor, administrator, CISO, CTO, CIO, security analyst, developer, and architect, among other roles. Sol’s current role as technology strategy vice president for Thales is a career highlight because it allows him the ability to solve the problems that he and his peers wrestle with every day.

“It’s very rewarding to understand a problem that your customers experience, and then design, build and innovate the right solution to the real problem,” Sol says.

His childhood might have presaged one professional distinction he earned. At former employer Tripwire, Sol was awarded the inaugural and only MacGyver Award, a nod to his unconventional yet resourceful thinking.

“I hope it wasn’t a comment on my coding style,” Sol jokes.

March 24, 2020
Bitslicing for Constant Time Cryptography

Bitslicing is a software implementation strategy for achieving constant time cryptographic algorithms to prevent cache and timing side-… Read More

June 3, 2019
Quantum-Resistant TLS in Go

Quantum computing attacks may have already begun. Confidential data is being exchanged using algorithms that will eventually be broken… Read More

May 13, 2019
Going Native with Kubernetes Operators

With an increasing shift to micro-services architectures, the ecosystem seems to be in a steady cycle of increasing complexity, followed… Read More

Engineering Secure Systems
Andrew Mobbs April 17, 2019
Engineering Secure Systems


The word “system” comes from the Greek σύστημα, a whole thing made of parts, or a composition. When we discuss the… Read More

Sean Burton February 13, 2019
Crafting the Perfect Pipeline in GitLab


When using a traditional single-server CI, fast/incremental builds are simple. Each time the CI builds your… Read More

January 17, 2019
EST: The Forgotten Standard

We have seen an explosion in certificate use in recent years. This is partly due to the trend towards miniaturization. The monolithic… Read More