Securosys Blogs

Scheme HSM in the cloud Aug 29 0 By RoRo

The most secure solution for storing encryption keys are Hardware Security Modules (HSM). They are a…

Schweiz als Produzentin von Cybersecurity-Hard- und Software Jul 27 0 By AC

Switzerland should start producing its own devices and software, says IT expert…

Keys are key - protect them Jan 6 0 By RoRo

Only 8% of all startups survive for more than …

HOW TO AVOID ZERO-DAY ATTACKS IN NETWORKING EQUIPMENT Aug 29 0 By AC

"The question is not if you get hacked, but when," said Robert Rogenmoser, CEO…

View towards the Saentis mountain Jun 9 0 By RoRo

A few weeks ago we attended a lecture by Adi Shamir, the co-inventor…

Picture for blog text encryption works May 18 0 By RoRo

A few weeks ago I had the pleasure of attending a lecture by …

World war two russian encryption machine Feb 2 0 By RoRo

Whom do you trust when buying secure network communications equipment? The systems that your company…

Rasperry Pi Board Jun 11 1 By RoRo

The Internet of things (IoT) is here, billions of things are already out there and 100x more devices…