<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">


Quantum Computers -  A threat for PKI?

Photo Credit: IBM quantum computer. An IBM Q cryostat used to keep IBM’s 50-qubit quantum computer cold in the IBM Q lab in Yorktown Heights, New York.   What are the prerequisites for a secure PKI today? Will quantum computers make PKIs obsolete in..

Read more
Growing up

Only 8% of all startups survive for more than 1000 days. We passed this milestone over the holidays. We must have done something right! Securosys is growing up!

Read more
How to avoid Zero-Day attacks in networking equipment

"The question is not if you get hacked, but when," said Robert Rogenmoser, CEO Securosys, at the Swiss Economic Forum on 06/09/2016 in Interlaken.

Read more
Manufacture in Switzerland? The perfect solution for security equipment!

A few weeks ago we attended a lecture by Adi Shamir, the co-inventor of the RSA encryption algorithm. After his talk someone asked him how to build a HSM. In fact, we are building a HSM - a hardware security module at Securosys. Obviously we were..

Read more
Encryption works

An attacker does not have to break encryption if they get your password. A few weeks ago I had the pleasure of attending a lecture by Adi Shamir. Adi is the “S” in RSA, the wide-spread public key encryption system he co-invented in 1977. Adi is..

Read more
Trust in your equipment

How to avoid backdoors in network security equipment. Whom do you trust when buying secure network communications equipment? The systems that your company relies on to bounce off unauthorized prying eyes? These boxes should provide encryption and..

Read more