Banner image

Horizons

Our information security research program explores new techniques for securing data in modern IT environments

#ThalesHorizons

Horizons explores and prototypes new data security technologies and techniques, particularly in distributed cloud environments. Findings are shared publicly, whenever possible, to further the advancement of the information security community.

Our Projects

threshhold

Threshold Signature

RSA signing with multi-party computation

 

signature

License to Clone

Lightweight licensing for software agents

image

Open Source Contributions

22

Projects

115

Commits

35043

Lines

Our People

Sol Cates image

Sol Cates

VP Technical Strategy

As a child, Sol Cates liked to learn how things worked by taking them apart. Computers piqued his interest for the same reason – he could use his hands to explore them and figure them out. Sol credits his constant curiosity for leading him into a cyber security career that now stretches past 20 years.

During that time, he has been a vendor, administrator, CISO, CTO, CIO, security analyst, developer, and architect, among other roles. Sol’s current role as technology strategy vice president for Thales is a career highlight because it allows him the ability to solve the problems that he and his peers wrestle with every day.

“It’s very rewarding to understand a problem that your customers experience, and then design, build and innovate the right solution to the real problem,” Sol says.

His childhood might have presaged one professional distinction he earned. At former employer Tripwire, Sol was awarded the inaugural and only MacGyver Award, a nod to his unconventional yet resourceful thinking.

“I hope it wasn’t a comment on my coding style,” Sol jokes.

Our Blogs

blog
Sean Burton February 13, 2019
Crafting the Perfect Pipeline in GitLab

Introduction

When using a traditional single-server CI, fast/incremental builds are simple. Each time the CI builds your… Read More

teddy
January 17, 2019
EST: The Forgotten Standard

We have seen an explosion in certificate use in recent years. This is partly due to the trend towards miniaturization. The monolithic… Read More

January 3, 2019
Exploring patterns and techniques for securing microservices

This blog accompanies a talk at DevSecCon London 2018 (… Read More

October 5, 2018
BADGER

This blog post covers our investigation and experimentation with threshold signature schemes, resulting in the construction, testing… Read More

October 4, 2018
License to Clone

Recently we’ve been considering the topic of client licensing for systems based on the “software agent” model. A software agent is an… Read More