Who We Are

Kudelski Security is an independent cybersecurity partner to enterprise and public sector clients, delivering powerful, bespoke solutions to address their toughest security challenges.

 

Purposeful innovation is at the heart of our corporate culture, which stems from our Kudelski Group heritage. Founded in 1951 with the launch of its NAGRA recording equipment, Kudelski Group is renowned for ground-breaking innovations that have shaped the evolution of digital television. Kudelski Group holds over 4,700 patents across a variety of technologies, and invests around $200 million in R&D each year.

Over the past two years, Kudelski Security has augmented its long-standing cryptography and engineering capabilities with some of the world’s foremost blockchain experts. We’ve developed the technical and strategic capabilities to help enterprises create secure blockchain technologies that address their business challenges, from inception and design to implementation and training.

 

With our legacy of technological experience and client-oriented approach, Kudelski Security is uniquely positioned to help enterprises build security into their blockchain solutions from day one.

Our global reach and cyber solutions focus are reinforced by key international partnerships, including alliances with world-leading security technology firms and experts in specialized services. As a result, our clients have access to the tools, knowledge, and talent needed to realize a comprehensive security program.

 

Kudelski Security has more than 300 employees, and locations across Europe and the United States.

OUR BLOCKCHAIN LEADERS

The Kudelski Blockchain Security Center is comprised of industry specialists and blockchain experts that enable you to implement and sustain new business models based on blockchain technology. This team offers sound advisory support and the proven technology you need in order to move forward with confidence.

 

Scott Carlson

Head of Blockchain Security – Scott spearheads the overall business strategy and direction of our program.

 

 

Ryan Spanier

Head of Solution Architecture and Research Ryan is responsible for the overall architecture, design and delivery of our solutions, including foundational technologies and developer solutions

 

 

Nathan Hamiel

Director of Cybersecurity Research Nathan leads the fundamental research program on blockchain, regularly presenting his research at global cybersecurity events.

 

 

Jean-Philippe Aumasson

Vice President of Technology Jean-Philippe (JP) leads the crypto assessments programs, and is a leading research and activist in the blockchain community.

This core team works closely together with Kudelski Security’s broader resources to simplify and secure blockchain design, development and deployment within in your enterprise environments.

 

  • Kudelski Security Advanced Labs provide the expertise and cutting-edge technology to carry out crypto assessments.
  • We have Research teams and Labs both in the United States and in Switzerland.
  • Advisory consultants help ensure blockchain technology strategy is securely and sustainably deployed.
  • The core team supports internal development initiatives to drive innovation in enterprise blockchain security, with real-world application.

Blog

  • Visibility is Key to Security Monitoring for IT, OT, and Cloud
    by Kudelski Security Team on May 30, 2019 at 2:38 pm

    With the rapid pace and complexity of business transformation coupled with ever-increasing threat sophistication targeting hybrid environments, IT & Security teams are looking for trusted security partners who can help increase visibility, reduce complexity, and address critical talent shortages. Large-scale breaches have impacted millions of people. The once-fringe subjects of ransomware, malware, denial of service […]

  • Can You Sign A Quantum State?
    by Tommaso Gagliardoni on May 21, 2019 at 2:00 pm

    Spoiler: no, you can’t, unless you also encrypt the quantum state. In this post we are going to look at recent scientific results about t […]

  • SWD – ARM’s alternative to JTAG
    by Nicolas Oberli on May 16, 2019 at 3:00 pm

    For embedded developers and hardware hackers, JTAG is the de facto standard for debugging and accessing microprocessor registers. This protocol has been in use for […]

  • Blockchain Does Not Remove Cybersecurity Risks
    by Scott J. Carlson on May 14, 2019 at 4:00 pm

    The Binance Hack shows us once again that simply by moving the world to blockchain, it will not remove the risks associated with two major areas: Users and Basic Best Practice Hygiene. It’s frustrating to me as a 20-year practitioner that we continue to make the same mistakes as 20-years ago, just in a different programming […]

  • “Security and Cloud, What Is the Right Recipe?” The Technologies
    by Giulio Faini on May 9, 2019 at 4:02 pm

    In the last but certainly not least in our cloud security series, we’ll be covering technologies. Under this umbrella, we cover both the security requirements and the cloud-native (or third-party) technologies that are needed to implement a “secure-to-be” public cloud. In literature, there are plenty of ready-to-be-used security frameworks that give great insight into what […]

In the Press

Let's Talk