<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">

SECUROSYS BLOG

Say Hello to Cloud Console: Your New Destination for CloudHSM Services

In 2017, Securosys became one of the first companies to offer CloudHSM services. The CloudHSM industry has shown a strong growth trend in the past 5 years, and will most likely keep expanding in the next few years. To meet this growing demand,..

23.07.2024
Read more
4 Ways to Secure Your Data in Public Clouds in 2024

"So, So you think you can tell, heaven from hell" - a quote from Pink Floyd's 'Wish You Were Here' - serves as a good analogy for determining whether you have full data sovereignty over your online data or if you have relinquished control to your..

26.06.2024
Read more
Navigating the quantum era: Understanding qubits and their implications for cybersecurity

Qubits* regularly make headlines in technology-savvy media: Another quantum leap in the development of quantum computers, which might threaten the security of internet communications. How should we interpret this development?

26.06.2024
Read more
Achieving Data Sovereignty on AWS: The Role of External Key Stores 

Amazon Web Services (AWS) is a leading provider of public cloud services, offering diverse solutions to individuals and enterprises globally. However, as data processing and storage in the public cloud increase, concerns about data privacy become..

26.06.2024
Read more
Manufacture in Switzerland? The perfect solution for security equipment!

A few weeks ago we attended a lecture by Adi Shamir, the co-inventor of the RSA encryption algorithm. After his talk someone asked him how to build a HSM. In fact, we are building a HSM - a hardware security module at Securosys. Obviously we were..

23.05.2024
Read more
Internet of Things - Where are all the keys?

The Internet of Things (IoT) is changing the business world. The ability to collect and evaluate data from billions of devices and sensors across ecosystems scattered around the world enables companies to make informed decisions and take immediate..

23.05.2024
Read more
Spectre and Meltdown make servers unsafe - for years to come!

So you are running your system on Azure or AWS. Why not, it is easy and quick to get going. It is scalable thanks to the many servers available and the virtualization environment. What could go wrong?

23.05.2024
Read more
Security for the Internet of Things

Can you trust your IoT? The Internet of things (IoT) is here, billions of things are already out there and 100x more devices are going to be deployed in the next few years. They improve our life and reduce cost in areas like Lighting, Health,..

23.05.2024
Read more
HSM in the cloud - what to watch out for?

Hardware Security Modul and cloud seem to be incompatible opposites. We associate cloud with the attribute „insecure“. In contrast, HSMs are supposed to be highly secure. So how can we secure HSM in the cloud? Securosys' CEO Robert Rogenmoser..

23.05.2024
Read more
How to avoid Zero-Day attacks in networking equipment

"The question is not if you get hacked, but when," said Robert Rogenmoser, CEO Securosys, at the Swiss Economic Forum on 06/09/2016 in Interlaken.

23.05.2024
Read more
Safekeeping of Crypto Assets

For real cold storage, do not rely on paper or USB keys. A piece of paper, a USB key - is this really the way I should keep my crypto assets? Well, if it is just for myself, and the value of crypto coins does not exceed a few hundred bucks, then..

23.05.2024
Read more
Growing up

Only 8% of all startups survive for more than 1000 days. We passed this milestone over the holidays. We must have done something right! Securosys is growing up!

23.05.2024
Read more
Why a hardened server is not good enough to store crypto assets and how to reliably store crypto assets

Blockchain technology can dramatically improve retail efficiency by enabling fully digital processing and eliminating unneeded intermediaries. It is used for tokenized goods, smart contracts and crypto currencies. However, a challenging problem..

23.05.2024
Read more
Quantum Computers -  A threat for PKI?

Photo Credit: IBM quantum computer. An IBM Q cryostat used to keep IBM’s 50-qubit quantum computer cold in the IBM Q lab in Yorktown Heights, New York. What are the prerequisites for a secure PKI today? Will quantum computers make PKIs obsolete in..

23.05.2024
Read more
GDPR Database Encryption

GDPR mandates that as from May 28 2018 on data of natural persons from the EU, such as customer data is safeguarded and access to is controlled. The only technical measure mentioned in the law is encryption.

23.05.2024
Read more
How to keep your business running in a world full of cyber security risks

Cyber security is a constant topic in the news. There is not a single day without the headline that passwords were stolen, companies breached, or data or bitcoins lost. The list seems endless. As the CEO of Securosys I regularly get asked whether..

09.08.2022
Read more
Segregation of Duties done right

Many business processes can be problematic or faulty if they are carried out by a single person in a company. The principle of segregation of duties (SoD) is used to prevent this. Segregation of duties is crucial for effective internal control as it..

05.05.2022
Read more
Escape Ransomware and Data Theft

In light of recent large-scale attacks on hundreds of companies by cybercriminal groups, the question is how to take precautions. Ransomware criminals encrypt the victim's data and promise to hand over the key in exchange for the ransom. The best..

19.07.2021
Read more
Protecting the crypto-stash with Multisig, MPC, and HSMs: Part IV

This is the final post in a series about the various facets of safeguarding crypto assets. In previous posts, we mainly looked at the criteria for establishing security in custody operations. In this text we’ll explore broader aspects of custody..

20.05.2020
Read more
Protecting the crypto-stash with Multi-Signature, MPC, and HSMs: Part III

This is the third in a series of posts exploring the various approaches to safeguarding crypto assets. Previously, we introduced the typical attack vectors and examined different approaches to protecting custodians against them. This post is about..

30.04.2020
Read more
Protecting the crypto stash with Multi-signature, Multi-Party-Computation, and HSMs: Part II

This is the second in a series of posts exploring the various approaches to safeguarding crypto assets. In the first post we explained our method and looked at the most common attack vector – physical access. This post goes into the other, more..

12.03.2020
Read more
Protecting the Crypto Stash with Multi-signature, Multi-party Computation and HSMs: Part I

We compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies and assets while also meeting operational, business, and regulatory requirements.

05.02.2020
Read more
Quality and reliability, anybody?

“Is this any good? Will it last?” Sometimes these questions are thrown directly at us, sometimes they are just written in our clients’ faces. In the end, everybody wants to know how we can guarantee not just the safety and security, but also the..

31.01.2020
Read more