CyberWire Podcast

CyberWire Daily Podcast Interviews Mike from Tide


This interview from May 5th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Mike Loewy, cofounder from Tide, who is suggesting that we should break the model so no one holds the keys to our data.

Interview excerpt


An organization called the Tide Foundation is looking to improve cybersecurity with a clever approach to access keys that splits them into millions of pieces distributed across servers around the world. Mike Loewy is co-founder of the Tide Foundation.

Dave Bittner, Host


What we're looking to do is to redefine the authority model in the digital world. Today, we have a scenario where the security of our systems and the protection of sensitive information is all, at the end of the day, reliant on blind trust, blind trust in the people that build, administer, and manage our IT systems. And what were -- those people today have effectively carte blanche authority over the sensitive information that these systems hold. And we're looking to redefine that. So that's no longer the case.

Mike Loewy. Guest


When we say blind trust, what exactly do we mean by that?

Dave Bittner, Host


...even with the implementation of zero trust, we're still seeing the most horrific breaches in history, and breaches have increased in frequency and severity. And the reason for that is because no matter how much effort we put into applying that model of constantly verifying, and checking, and making sure that, you know, the -- whoever we're providing this access to is who they say they are. There is some kind of route authority, something somewhere that has to make that final decision of, can I provide access to this resource? Can you swipe and open this front door? Or can you access this file? And that authority lives somewhere on something and is administered by someone. And that means that there's always this kind of Achilles' heel that exists inside of a system, whether it's the identity and access management system, the firewall, whatever security apparatus it is, and there's no way to verify the integrity of those people administering those systems, whether there's mal intent or whether they're just human beings that make mistakes, accidentally click on the wrong links. That's what I mean.

Mike Loewy, Guest

Recent News

Blog
25 Mar 2025

Rethinking Cybersecurity

The future of cybersecurity for platform developers

Press
27 Mar 2025

Keys to Nowhere

Cryptography Revolution Thwarting Hackers

Press
6 Mar 2025

Scientist's take on Tide

2 min explainer on why cybersecurity is failing and Tide's approach to fix it

Press
20 Jan 2025

Sky News Feature

"Tide technology has potential to revolutionize cyber security"

Press
15 Jan 2025

Q&A with Co-founder Yuval Hertzog

Reimagining trust in the digital world.

Press
4 Nov 2024

Tide Win Tech Impact Award

Award for impact in transforming breaches into a non-issue.

Announcement
18 Nov 2024

TideCloak Secures Developers

Major Organizations Among Early Adopters Reporting Freedom from Security Concerns

Press
11 Mar 2024

Infrastructure Magazine Feature

New approach to securing critical infrastructure.

Press
23 Nov 2023

RMIT, Tide, AWS Collab Unveiled

Tide's "Ineffable Cryptography" to secure critical infrastructure

Blog
25 Sep 2024

Cybersecurity’s Kryptonite

It’s cybersecurity’s kryptonite: Why are you still holding it?

Blog
25 Sep 2024

Nature's key to cybersecurity’s future

How nature holds the key to cybersecurity’s future

Blog
25 Sep 2024

I got 99 problems, but a breach ain’t one

Ineffable Cryptography: The science behind a new era of cybersecurity

Contact

Thanks for getting in touch. We'll get back to you as soon as possible!

Send another message