Swarmer and SpiderOak Partner to Secure Autonomous Drone Operations in Contested Environments
RESTON, VA / ACCESS Newswire / May 19, 2025 / Swarmer, a leading provider of autonomous drone software, has entered into an agreement with SpiderOak, the leading cybersecurity company powering zero-trust solutions for the tactical edge. As part of the agreement, Swarmer will integrate the SpiderOak platform to provide secure interactions and revocation to its autonomous software platforms. This integration specifically addresses the challenges of securing communications for autonomous fleets operating in contested environments, including electronic warfare zones in Ukraine.
Swarmer's technology enables uncrewed air, sea, and ground vehicles to communicate and coordinate autonomously without human intervention, even when GPS and RF communication are jammed. This allows for adaptive mission execution through coordinated swarm formations - allowing one operator to control hundreds of drones.
The SpiderOak platform provides a unique combination of security controls plus guaranteed eventual delivery designed for autonomous operations at the tactical edge. With SpiderOak, Swarmer's autonomy software can ensure any to any message exchanges in the formation are authenticated, authorized, and encrypted without additional networking controls or certificate management. The low Size, Weight, and Power (SWaP) requirements and decentralized security model eliminate the need for additional infrastructure, making SpiderOak ideal for autonomous operations in challenging environments.
'SpiderOak simplifies how our warfighter replenishes losses in theater ensuring replacements are authenticated and authorized to join the operation, while ensuring that lost and potentially compromised assets are revoked,' said Swarmer's Co-founder and CEO, Sergey Kuprienko.
'Autonomy at the edge brings a new set of security and communication challenges to the digital battlefield, especially with autonomous systems in contested or unreliable environments. Our mesh platform provides zero-trust access control and data exchange without the infrastructure or connectivity overhead that traditional security tools require. We are excited to partner with Swarmer to bring this next generation capability to market,' said Dave Pearah, CEO of SpiderOak.
'As we've seen in contemporary combat, autonomous fleets are significant force multipliers on the modern battlefield-but without robust security, they can become liabilities instead of assets. As missions evolve and new systems are added to the fight, the ability to authorize and authenticate every mission, operator, and data flow in real time will become essential. The integrity, confidentiality, and adaptability of these systems must be baked in from the start. The side that secures its data and controls access dynamically will have a significant competitive advantage,' said Lieutenant General Ken Tovo, U.S. Army (Retired); former Commanding General, US Army Special Operations Command
About Swarmer
Founded in 2023, Swarmer is revolutionizing autonomous UAS operations on the battlefield with a software system that enables drones (and robots) to operate autonomously and work together in large teams. With the team's background in the world's leading tech companies, and with boots on the ground in real conflict zones, Swarmer's mission is to enable individual operators to control hundreds of drones simultaneously - drones of any manufacturer, type, or purpose. Swarmer's technology allows uncrewed vehicles to be interoperable and work together seamlessly. Learn more at getswarmer.com.
About SpiderOak
SpiderOak is a 100% U.S.-owned and operated software company dedicated to solving the computer security challenges of the 21st century. Our technology allows applications to secure all interactions between each other, providing strong assurances of authority and identity and the flexibility to integrate with existing systems, software, and devices beyond centralized cloud services and data centers to the far reaches of the tactical edge. For more information about SpiderOak products, services, or business development opportunities, check us out at www.spideroak.com.
Media Contact
Escalate PR for SpiderOak
[email protected]
SOURCE: SpiderOak
press release
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Bloomberg
14 minutes ago
- Bloomberg
Russia Plans to Extend Gasoline Export Ban Amid Drone Attacks
Russia plans to extend its ban on gasoline exports from fuel producers through September to ensure domestic supplies as Ukrainian drone attacks disrupt major refineries. Deputy Prime Minister Alexander Novak supported the plan to extend the restrictions, currently in place until the end of August, 'in order to maintain a stable situation on the domestic fuel market during the period of high seasonal demand and agricultural field work,' the government said in statement. The ban for non-producers can be extended through October.


New York Times
2 hours ago
- New York Times
Russia Seeks to Add Trade and Arms Control Into Trump-Putin Talks
A day ahead of the meeting between President Trump and President Vladimir V. Putin of Russia, the Kremlin on Thursday signaled that apart from Ukraine, it was also interested in discussing other subjects, like economic links and nuclear arms. Remarks by Mr. Putin and his foreign policy aide highlighted how, when dealing with Washington, Moscow has tried to dilute discussions about ending the fighting in Ukraine by packaging them together with other bilateral issues. In particular, Russia has focused on the prospect of discussing arms control and restoring economic ties with the United States. On Thursday, Mr. Putin convened top officials at the Kremlin to brief them about the next day's meeting. In his opening remarks, Mr. Putin said he believed that the United States was making 'quite energetic efforts to stop the fighting, end the crisis, and reach agreements of interest to all parties involved in this conflict.' He added that an agreement on Ukraine 'would create long-term conditions of peace between our countries, in Europe, and in the world as a whole, if we reach agreements in the next stages in the field of strategic offensive arms control.' Because of increased hostility between the two countries and the power disparity after the Soviet collapse, the arms-control regime that anchored relations between Moscow and Washington during the Cold War has significantly weakened. At the beginning of August, Russia said that it would no longer abide by a defunct treaty prohibiting the deployment of intermediate-range missiles. The nuclear arms reduction treaty, signed in 2011 during a brief thaw between the two countries, is set to expire next February. Want all of The Times? Subscribe.


Forbes
4 hours ago
- Forbes
Why Post-Quantum Cryptography Can't Wait For Tomorrow
Ryan Frankel is President & CTO of HostingAdvice. Much like nuclear fusion, it seems quantum computing is always a decade or two away from hitting the mainstream. Giant machines crunching calculations in parallel would give them the ability to crack encryption that would take today's fastest supercomputer millions of years. While we're certainly still a few years away from this, bad actors are already ingeniously preparing for the moment. They're stealing and storing encrypted data, betting that in five or 10 years, they'll have access to a quantum computer capable of unlocking it. This tactic, known as harvest-now-decrypt-later, turns someday into a ticking clock for organizations managing sensitive data. For those of us working in data centers, cloud infrastructure, web hosting and related services, this risk is fast becoming a security vector that we can no longer ignore. If your business handles sensitive information, such as financial transactions, customer records and contracts, some of that data will still matter years from now. And when quantum computers get up to speed, everything encrypted with traditional methods can be fair game. Luckily, I'm not the only one who has thought about this. Companies are starting to release post-quantum cryptography that will help alleviate this concern, even if it doesn't totally resolve it. Most of our encryption stays safe behind complex math problems that are hard for classical computers to solve. With enough time, current computers can, in theory, break that encryption—but it would take centuries. If current computers are opening one door at a time, quantum computers are opening all of the doors at once. It is speed that enables them to easily foil today's encryption techniques. While, as Richard Feynman famously said, 'nobody understands quantum mechanics,' folks understand it enough to have built current computers of more than 1,000 qubits. The day someone gets a quantum machine running at scale, the encryption we trust could become obsolete almost overnight. It won't just compromise future data. It will unlock whatever is sitting in storage, collected years before. Post-quantum cryptography (PQC for short) is a set of tools and techniques designed to stay secure even against quantum computers. These systems rely on mathematical puzzles that quantum machines can't easily solve. If you follow the National Institute of Standards and Technology's (NIST) ongoing project to standardize PQC algorithms, you've probably heard the terms 'Kyber' and 'Dilithium.' Kyber is quantum-safe encryption and Dilithium is a digital signature that quantum computers cannot easily forge. These tools are already moving from research to practice. Cloud providers are testing them and browsers are experimenting with them. Some companies are layering PQC into TLS (the technology that keeps websites secure), so even if quantum decryption becomes possible, the locks will still hold. Even if you're not ready to jump in with both feet, you can start taking practical steps now to get ready: • Take inventory. Make a list of where encryption is used in your business. Focus on what needs to stay secure for years to come. Backups, archives and long-term contracts are good places to start. • Talk to your vendors. Ask your cloud and hosting providers how they're planning for the quantum transition. If they don't have an answer yet, press for a plan. • Experiment early. Some tools already support 'hybrid' encryption, pairing current algorithms with quantum-resistant ones. Set up test environments and see how they perform. • Educate your teams. Bring your developers and security staff up to speed. Even a basic understanding of what PQC is and why it matters will help them make informed decisions down the road. • Keep watch. Standards are still evolving. NIST will finalize recommendations soon, and leading organizations like Cloudflare and Google regularly share updates and guides. Appoint someone on your team to follow this closely. The biggest misconception about post-quantum cryptography is that it's a problem for the next decade. In reality, the groundwork you lay today is what will protect you tomorrow. Switching to new encryption systems is becoming easier and will be at the flip of the switch in the coming months. Every week you wait is another week attackers can collect encrypted data that may still be valuable years down the line. Quantum computing may still be in its early stages, but its impact on security is already here. Harvest-now-decrypt-later isn't a theory—it's happening. You don't have to overhaul everything today. But you do have to begin. Inventory your systems. Talk to your providers. Test the tools. Stay informed. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?