Develop Secure Connected Products. Fast.

Reduce risk earlier, and ship products faster.

Don't let conventional security solutions slow down your release schedule.

Work with security experts who understand the constraints of product development.

Security Assessment

You have risk managers or other stakeholders who require security testing before you can release your product.

Carve has the expertise to satisfy risk stakeholders and improve your security.
Learn More

Reduce Risk Earlier

You know that you can do more than last minute pen testing, but don't have the expert security resources required.

Carve will embed with your team to comprehensively address security.
Learn more

Our Services

Customized Security Solutions Engineered For Your Business
Assessment Services
Enterprise Services
Continual Risk Assessment
Feb. 19, 2019
What Does Federated Login Mean? A Simple, Detailed Answer.

This post explains the concept of federated login, its evolution, where it works best, the benefits, and the risks of implementing it.

READ MORE >
Feb. 4, 2019
How to Use Secrets in Source Code? Move Them Elsewhere.

How do you manage secrets in source code? You don't. Your security tokens, keys, and passwords belong outside of your code, in a separate location.

READ MORE >
Feb. 1, 2019
Parsing binaries with Kaitai Struct

Kaitai Struct is a general-purpose declarative language for describing binary data structures. With it we can parse binary file formats, in-memory data structures, network packets, etc. 

In this article we describe and parse a ESP8266 firmware image file using the KSY language.

READ MORE >
Jan. 21, 2019
What is Product Security? How to Implement It and Who Owns It

In this article we investigate why we continue to face the same types of security problems, and why security should be a priority across the entire product lifecycle.

READ MORE >