<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">


Internet of Things - Where are all the keys?

The Internet of Things (IoT) is changing the business world. The ability to collect and evaluate data from billions of devices and sensors across ecosystems scattered around the world enables companies to make informed decisions and take immediate..

Read more
Spectre and Meltdown make servers unsafe - for years to come!

So you are running your system on Azure or AWS. Why not, it is easy and quick to get going. It is scalable thanks to the many servers available and the virtualization environment. What could go wrong?

Read more
GDPR Database Encryption

GDPR mandates that as from May 28 2018 on data of natural persons from the EU, such as customer data is safeguarded and access to is controlled.  The only technical measure mentioned in the law is encryption.

Read more
Safekeeping of Crypto Assets

For real cold storage, do not rely on paper or USB keys. A piece of paper, a USB key - is this really the way I should keep my crypto assets? Well, if it is just for myself, and the value of crypto coins does not exceed a few hundred bucks, then..

Read more
HSM in the cloud - what to watch out for?

Hardware Security Modul and cloud seem to be incompatible opposites. We associate cloud with the attribute „insecure“. In contrast, HSMs are supposed to be highly secure. So how can we secure HSM in the cloud? Securosys' CEO Robert Rogenmoser..

Read more
Switzerland as the ideal production site for cyber security hardware and software

Switzerland should start producing its own devices and software, says IT expert Gunnar Porada. Sounds like a good idea to us! 

Read more