"Cybersecurity specialists at Kudelski Group carried out an audit of IOHK’s Icarus code base over the summer. The resulting written reports submitted to our Bourbaki team have been thorough and intelligible, and have enabled IOHK’s engineers to address the issues identified in an efficient way“.
“The Kudelski Security team played an important role in auditing every aspect of our smartcard wallet code. With their defense-in-depth approach to security, they provided in a timely and professional way, the adequate defenses to deliver our solution to the market with confidence”
With the rapid pace and complexity of business transformation coupled with ever-increasing threat sophistication targeting hybrid environments, IT & Security teams are looking for trusted security partners who can help increase visibility, reduce complexity, and address critical talent shortages. Large-scale breaches have impacted millions of people. The once-fringe subjects of ransomware, malware, denial of service […]
Spoiler: no, you can’t, unless you also encrypt the quantum state. In this post we are going to look at recent scientific results about t […]
For embedded developers and hardware hackers, JTAG is the de facto standard for debugging and accessing microprocessor registers. This protocol has been in use for […]
The Binance Hack shows us once again that simply by moving the world to blockchain, it will not remove the risks associated with two major areas: Users and Basic Best Practice Hygiene. It’s frustrating to me as a 20-year practitioner that we continue to make the same mistakes as 20-years ago, just in a different programming […]
In the last but certainly not least in our cloud security series, we’ll be covering technologies. Under this umbrella, we cover both the security requirements and the cloud-native (or third-party) technologies that are needed to implement a “secure-to-be” public cloud. In literature, there are plenty of ready-to-be-used security frameworks that give great insight into what […]