A few weeks ago we attended a lecture by Adi Shamir, the co-inventor of the RSA encryption algorithm. After his talk someone asked him how to build a HSM. In fact, we are building a HSM - a hardware security module at Securosys. Obviously we were..
An attacker does not have to break encryption if they get your password. A few weeks ago I had the pleasure of attending a lecture by Adi Shamir. Adi is the “S” in RSA, the wide-spread public key encryption system he co-invented in 1977. Adi is..
How to avoid backdoors in network security equipment. Whom do you trust when buying secure network communications equipment? The systems that your company relies on to bounce off unauthorized prying eyes? These boxes should provide encryption and..
Can you trust your IoT? The Internet of things (IoT) is here, billions of things are already out there and 100x more devices are going to be deployed in the next few years. They improve our life and reduce cost in areas like Lighting, Health,..