skip to Main Content
Hacker

Secure Boot on Steroids

One of the biggest threats to the internet of things (IoT) is the installation of malicious software (malware) on IoT devices that changes the behavior of these devices to facilitate very specific attacks. This malware is often the first step…

Root of Trust Integration

OpenTitan: Transparency Leads to Greater Security

The statement in the title may seem counter-intuitive – aren’t most security systems based on propriety secrets? Yes, they are. These secrets are the cryptographic root keys on which the security of a system is built. However, this does not…

samantha lam zFy6fOPZEu0 unsplash square

“And one (key) to rule them all…”

QuiddiKey: A Single Cryptographic Solution for the Lifecycle of a Connected Device Author: Pim Tuyls, Founder & CEO | Originally published on Design & Reuse As fevered blockchain talk starts to cool and quantum computing peeks over the far horizon,…

Deception Image

Nothing is True and Everything is Possible

Pim Tuyls, Founder & CEO | At panel discussions on IoT security, such as those at the recently completed RSA Conference, speakers often cover topics such as “the expanding attack surface” and “zero-day vulnerabilities.” One attack vector that’s often missing…

Back To Top