Securosys Blogs

Crypto Assets Feb 5 0 By RoRo

A piece of paper, a USB key - is this really the way I should keep my crypto assets? Well, if it is…

Scheme HSM in the cloud Aug 29 0 By RoRo

The most secure solution for storing encryption keys are Hardware Security Modules (HSM). They are a…

Schweiz als Produzentin von Cybersecurity-Hard- und Software Jul 27 0 By AC

Switzerland should start producing its own devices and software, says IT expert…

Keys are key - protect them Jan 6 0 By RoRo

Only 8% of all startups survive for more than …

HOW TO AVOID ZERO-DAY ATTACKS IN NETWORKING EQUIPMENT Aug 29 0 By AC

"The question is not if you get hacked, but when," said Robert Rogenmoser, CEO…

View towards the Saentis mountain Jun 9 0 By RoRo

A few weeks ago we attended a lecture by Adi Shamir, the co-inventor…

Picture for blog text encryption works May 18 0 By RoRo

A few weeks ago I had the pleasure of attending a lecture by …

World war two russian encryption machine Feb 2 0 By RoRo

Whom do you trust when buying secure network communications equipment? The systems that your company…