"Cybersecurity specialists at Kudelski Group carried out an audit of IOHK’s Icarus code base over the summer. The resulting written reports submitted to our Bourbaki team have been thorough and intelligible, and have enabled IOHK’s engineers to address the issues identified in an efficient way“.
“The Kudelski Security team played an important role in auditing every aspect of our smartcard wallet code. With their defense-in-depth approach to security, they provided in a timely and professional way, the adequate defenses to deliver our solution to the market with confidence”
Power analysis is a specific kind of side-channel analysis performed on the power consumption of a target device. This technique can be applied for various […]
Introduction Passwords are a problem and you’d be hard-pressed to find a security professional who disagrees. According to Verizon’s 2019 Data Breach Investigation Report, 62% […]
In the first of our two-part series, we covered the unhygienic security practices and the impact of the modern healthcare ecosystem. This final installment digs deeper and provides useful recommendations for alleviating those risks. Privacy Enigma However, containing the said issues or implementing privacy and security controls is challenging and not short of pitfalls. Fundamentally, […]
The modern healthcare ecosystem is undeniably rewarding to one and all. It dramatically improves the efficiency of healthcare services, optimizes healthcare workflows, and originates cutting-edging research that improves vitality. But it is also immensely complex and inherently insecure, with a high susceptibility to security threats, especially from threat actors whose primary intention is to either […]
After part 1, you should now be familiar with the basics of SWD. We finished the article at the gates of an important part of […]