Banner image


Our information security research program explores new techniques for securing data in modern IT environments


Horizons explores and prototypes new data security technologies and techniques, particularly in distributed cloud environments. Findings are shared publicly, whenever possible, to further the advancement of the information security community.

Our Projects


Threshold Signature

RSA signing with multi-party computation


License to Clone

Lightweight licensing for software agents

View all


Open Source Contributions







Our People

Sol Cates image

Sol Cates

VP Technical Strategy

As a child, Sol Cates liked to learn how things worked by taking them apart. Computers piqued his interest for the same reason – he could use his hands to explore them and figure them out. Sol credits his constant curiosity for leading him into a cyber security career that now stretches past 20 years.

During that time, he has been a vendor, administrator, CISO, CTO, CIO, security analyst, developer, and architect, among other roles. Sol’s current role as technology strategy vice president for Thales is a career highlight because it allows him the ability to solve the problems that he and his peers wrestle with every day.

“It’s very rewarding to understand a problem that your customers experience, and then design, build and innovate the right solution to the real problem,” Sol says.

His childhood might have presaged one professional distinction he earned. At former employer Tripwire, Sol was awarded the inaugural and only MacGyver Award, a nod to his unconventional yet resourceful thinking.

“I hope it wasn’t a comment on my coding style,” Sol jokes.

Our Blogs

January 17, 2019
EST: The Forgotten Standard

We have seen an explosion in certificate use in recent years. This is partly due to the trend towards miniaturization. The monolithic… Read More

January 3, 2019
Exploring patterns and techniques for securing microservices

This blog accompanies a talk at DevSecCon London 2018 (… Read More

October 5, 2018

This blog post covers our investigation and experimentation with threshold signature schemes, resulting in the construction, testing… Read More

October 4, 2018
License to Clone

Recently we’ve been considering the topic of client licensing for systems based on the “software agent” model. A software agent is an… Read More