Julian has founded, built, managed, and led multiple software companies over four decades. Having previously raised tens of millions of dollars of equity finance, he managed three successful disposals, two to publicly-quoted companies, yielding above-average returns to shareholders. His operational focus is on finance, financial strategy, and legal.
Eugene has managed software development with high security and performance demands for over 15 years. His extensive experience and research enable him to focus on the challenges that large and small companies experience when seeking to make data security central to their operations, especially in the face of external pressures and uncertainties.
Chris originally trained as an economist but has coded, designed, and invested in a diverse range of software systems and companies for over 40 years. Elegant, appropriate, and useful code continues to delight. Chris sees effort spent to make world-class data security available to all as central to advancing the common good both now and into the future.
Anastasiia is a software engineer and manager with a wide technological background spanning mobile app development to security engineering. Her current focus is cryptography and applied security, helping companies to build secure yet usable systems. Anastasiia is a frequent contributor to international conferences and co-organiser of cyber-security events.
We help the leaders to build secure systems at scale
Products and product sheets
Acra, a database security suite
Acra provides 9 security controls in one suite, pluggable as proxy, API or SDK in your architecture. Features include transparent field-level encryption, searchable encryption, data masking and firewalling.
Themis, a cross-platform crypto library
Themis provides cryptosystems for securing data at rest and data in transit. Solves 90% use cases for protecting data in mobile, web and server-side apps.
Hermes, end-to-end secure data storage
End-to-end secure data storage, processing, and sharing framework with zero trust to storage/exchange infrastructure.
Security tips on using YubiKey and FIDO U2F
Designed for securing online accounts, FIDO U2F as a protocol and YubiKey as a hardware tool are not silver bullets. If not used wisely, this powerful combo becomes an attractive target ...
Flutter application security considerations
Ensuring security in cross-platform development with Flutter: Pros and cons, platform-specific security risks, fundamental security recommendations for using Flutter effectively and avoi...
Digital payment security: Architecture guide
Building secure digital wallets is a challenge when it comes to balancing between convenience and security. How can we build secure payment solutions that meet the needs of fintech users...
Panel Discussion: Secure Our Future
Anastasiia Voitova @ Devoxx Ukraine 2022
Demystifying myths about women in IT
Julia Mezher @ What's wrong with IT, charitable live stream
Charitable live stream: Cybersecurity in wartime
Anastasiia Voitova @ fwdays 2022
The war in Ukraine: Cyberfront
Anastasiia Voitova @ May Contain Hackers 2022
The secret life of Android apps
Artur Hil @ OWASP Zhytomyr 2021 Meetup
Keynote: Data is a new security boundary
Anastasiia Voitova @ OWASP Global AppSec US 2021 Conference
The art of secure architecture
Julia Mezher @ Craft
Designing secure architectures the modern way, regardless of stack
Eugene Pilyankevich @ QCon London 2020
Maintaining cryptographic library for 12 languages
Anastasiia Voitova @ BlackAlps
Search over encrypted records: from academic dreams to production-ready tool
Artem Storozhuk @ NoNameCon
In the media
Cybersecurity in wartime: how Ukraine's infosec community is coping
Volunteers patrol Ukraine's cyber front during war
Encryption in the Ukrainian War
Anastasiia Voitova: WTF is Cloud Native Data Security?
Eugene Pilyankevich's interview: Cutting-edge cryptography & data protection solutions at your fingertips
Eugene Pilyankevich: Empowering developers to easily build secure applications that treat sensitive data responsibly
Acra: Open-source database protection with field-level encryption and intrusion detection
WWDC21’s principal security and privacy announcements
Bear: Einblick in die außergewöhnliche Notizen-App mit Apple Design Award!
Application level encryption for software architects
Security Logs: cryptographically signed audit logging for data protection
Computers Are Hard: security and cryptography with Anastasiia Voitova
iOS 14’s Best Privacy Feature? Catching Data-Grabbing Apps
WWDC20’s major security and privacy announcements
Secure development is dead, long live secure development
Keynote: Data is a new security boundary — Anastasiia Voitova
Never store secrets in the resources of your app! (feat. Anastasiia Voitova)
Cryptographic protection of ML models — Anastasiia Voitova
Why can't developers make it secure? — Julia Mezher
End-to-end encrypted doesn't mean secure — Anastasiia Voitova
Maintaining cryptographic library for 12 languages — Anastasiia Voitova
Use cryptography, don’t learn it — Anastasiia Voitova
Building reliable mobile app security
Secure Authentication. Are you sure you do it right? — Julia Mezher
Designing secure architectures the modern way, regardless of stack — Eugene Pilyankevich
Security in Java, what do we need to know and how to keep our applications secure
Anastasiia Voitova—Encryption is easy, key management is hard
Mobile App security: a money game with Anastasiia Voitova
Security for developers
Anastasiia Voitova: security software engineer journey
Build secure mobile applications with Anastasiia Voitova
Anastasiia Voitova—Use cryptography; don’t learn it
Discussing Apple’s new privacy-related features with Anastasiia Voitova
Developer interview: Anastasiia Voitova on WWDC expectations from a security and privacy perspective
Talking with the server it’s supposed to, with special guests Anastasiia Voitova and Marcin Krzyzanowski
We’ll be happy to share our story and discuss all the fancy words like cryptography and security with you.
HQ, United Kingdom
190 Clarence Gate Gardens
London NW1 6AD
Media related questions here: