Julian has founded, built, managed, and led multiple software companies over four decades. Having previously raised tens of millions of dollars of equity finance, he managed three successful disposals, two to publicly-quoted companies, yielding above-average returns to shareholders. His operational focus is on finance, financial strategy, and legal.
Eugene has managed software development with high security and performance demands for over 15 years. His extensive experience and research enable him to focus on the challenges that large and small companies experience when seeking to make data security central to their operations, especially in the face of external pressures and uncertainties.
Chris originally trained as an economist but has coded, designed, and invested in a diverse range of software systems and companies for over 40 years. Elegant, appropriate, and useful code continues to delight. Chris sees effort spent to make world-class data security available to all as central to advancing the common good both now and into the future.
Anastasiia is a software engineer and manager with a wide technological background spanning mobile app development to security engineering. Her current focus is cryptography and applied security, helping companies to build secure yet usable systems. Anastasiia is a frequent contributor to international conferences and co-organiser of cyber-security events.
We help the leaders to build secure systems at scale
Products and product sheets
Acra, a database security suite
Acra provides 9 security controls in one suite, pluggable as proxy, API or SDK in your architecture. Features include transparent field-level encryption, searchable encryption, data masking and firewalling.
Themis, a cross-platform crypto library
Themis provides cryptosystems for securing data at rest and data in transit. Solves 90% use cases for protecting data in mobile, web and server-side apps.
Cryptographic failures in RF encryption allow stealing robotic devices
Stunned by losing their robotic devices, [REDACTED] learnt that they were hijacked by attackers even with communication being encrypted. Having researched its firmware and found numerous...
RepoMetaScore: evaluating supply chain risks of open-source repositories
Releasing RepoMetaScore (repository metadata scoring): a dependency checking tool that analyzes metadata of open-source project, including commit history and contributors’ background. Re...
Cossack Labs stands on guard for security of Ukrainian companies
Cossack Labs stands with Ukraine and offers free security assessment and engineering services for Ukrainian companies to improve country protection and resilience....
The secret life of Android apps
Artur Hil @ OWASP Zhytomyr 2021 Meetup
Keynote: Data is a new security boundary
Anastasiia Voitova @ OWASP Global AppSec US 2021 Conference
The art of secure architecture
Julia Potapenko @ Craft
Designing secure architectures the modern way, regardless of stack
Eugene Pilyankevich @ QCon London 2020
Maintaining cryptographic library for 12 languages
Anastasiia Voitova @ BlackAlps
Search over encrypted records: from academic dreams to production-ready tool
Artem Storozhuk @ NoNameCon
In the media
Volunteers patrol Ukraine's cyber front during war
Encryption in the Ukrainian War
Anastasiia Voitova: WTF is Cloud Native Data Security?
Eugene Pilyankevich's interview: Cutting-edge cryptography & data protection solutions at your fingertips
Eugene Pilyankevich: Empowering developers to easily build secure applications that treat sensitive data responsibly
Acra: Open-source database protection with field-level encryption and intrusion detection
WWDC21’s principal security and privacy announcements
Bear: Einblick in die außergewöhnliche Notizen-App mit Apple Design Award!
Application level encryption for software architects
Security Logs: cryptographically signed audit logging for data protection
Computers Are Hard: security and cryptography with Anastasiia Voitova
iOS 14’s Best Privacy Feature? Catching Data-Grabbing Apps
WWDC20’s major security and privacy announcements
Secure development is dead, long live secure development
Keynote: Data is a new security boundary — Anastasiia Voitova
Never store secrets in the resources of your app! (feat. Anastasiia Voitova)
Cryptographic protection of ML models — Anastasiia Voitova
Why can't developers make it secure? — Julia Potapenko
End-to-end encrypted doesn't mean secure — Anastasiia Voitova
Maintaining cryptographic library for 12 languages — Anastasiia Voitova
Use cryptography, don’t learn it — Anastasiia Voitova
Building reliable mobile app security
Secure Authentication. Are you sure you do it right? — Julia Potapenko
Designing secure architectures the modern way, regardless of stack — Eugene Pilyankevich
Anastasiia Voitova—Encryption is easy, key management is hard
Mobile App security: a money game with Anastasiia Voitova
Security for developers
Anastasiia Voitova: security software engineer journey
Build secure mobile applications with Anastasiia Voitova
Anastasiia Voitova—Use cryptography; don’t learn it
Discussing Apple’s new privacy-related features with Anastasiia Voitova
Developer interview: Anastasiia Voitova on WWDC expectations from a security and privacy perspective
Talking with the server it’s supposed to, with special guests Anastasiia Voitova and Marcin Krzyzanowski
We’ll be happy to share our story and discuss all the fancy words like cryptography and security with you.
HQ, United Kingdom
190 Clarence Gate Gardens
London NW1 6AD
Media related questions here: