SECUROSYS BLOG

Why a hardened server is not good enough to store crypto assets and how to reliably store crypto assets

Blockchain technology can dramatically improve retail efficiency by enabling fully digital processing and eliminating unneeded intermediaries. It is used for tokenized goods, smart contracts and crypto currencies. However, a challenging problem..

13.12.2018
Read more
Internet of Things - Where are all the keys?

The Internet of Things (IoT) is changing the business world. The ability to collect and evaluate data from billions of devices and sensors across ecosystems scattered around the world enables companies to make informed decisions and take immediate..

02.08.2018
Read more
Spectre and Meltdown make servers unsafe - for years to come!

So you are running your system on Azure or AWS. Why not, it is easy and quick to get going. It is scalable thanks to the many servers available and the virtualization environment. What could go wrong?

28.05.2018
Read more
GDPR Database Encryption

GDPR mandates that as from May 28 2018 on data of natural persons from the EU, such as customer data is safeguarded and access to is controlled.  The only technical measure mentioned in the law is encryption.

21.02.2018
Read more
Safekeeping of Crypto Assets

For real cold storage, do not rely on paper or USB keys. A piece of paper, a USB key - is this really the way I should keep my crypto assets? Well, if it is just for myself, and the value of crypto coins does not exceed a few hundred bucks, then..

04.02.2018
Read more
HSM in the cloud - what to watch out for?

Hardware Security Modul and cloud seem to be incompatible opposites. We associate cloud with the attribute „insecure“. In contrast, HSMs are supposed to be highly secure. So how can we secure HSM in the cloud? Securosys' CEO Robert Rogenmoser..

28.08.2017
Read more
Switzerland as the ideal production site for cyber security hardware and software

Switzerland should start producing its own devices and software, says IT expert Gunnar Porada. Sounds like a good idea to us! 

26.07.2017
Read more
Quantum Computers -  A threat for PKI?

Photo Credit: IBM quantum computer. An IBM Q cryostat used to keep IBM’s 50-qubit quantum computer cold in the IBM Q lab in Yorktown Heights, New York.   What are the prerequisites for a secure PKI today? Will quantum computers make PKIs obsolete in..

09.02.2017
Read more
Growing up

Only 8% of all startups survive for more than 1000 days. We passed this milestone over the holidays. We must have done something right! Securosys is growing up!

05.01.2017
Read more
How to avoid Zero-Day attacks in networking equipment

"The question is not if you get hacked, but when," said Robert Rogenmoser, CEO Securosys, at the Swiss Economic Forum on 06/09/2016 in Interlaken.

28.08.2016
Read more
Manufacture in Switzerland? The perfect solution for security equipment!

A few weeks ago we attended a lecture by Adi Shamir, the co-inventor of the RSA encryption algorithm. After his talk someone asked him how to build a HSM. In fact, we are building a HSM - a hardware security module at Securosys. Obviously we were..

08.06.2015
Read more
Encryption works

An attacker does not have to break encryption if they get your password. A few weeks ago I had the pleasure of attending a lecture by Adi Shamir. Adi is the “S” in RSA, the wide-spread public key encryption system he co-invented in 1977. Adi is..

17.05.2015
Read more
Trust in your equipment

How to avoid backdoors in network security equipment. Whom do you trust when buying secure network communications equipment? The systems that your company relies on to bounce off unauthorized prying eyes? These boxes should provide encryption and..

01.02.2015
Read more
Security for the Internet of Things

Can you trust your IoT? The Internet of things (IoT) is here, billions of things are already out there and 100x more devices are going to be deployed in the next few years. They improve our life and reduce cost in areas like Lighting, Health,..

10.06.2014
Read more