"Cybersecurity specialists at Kudelski Group carried out an audit of IOHK’s Icarus code base over the summer. The resulting written reports submitted to our Bourbaki team have been thorough and intelligible, and have enabled IOHK’s engineers to address the issues identified in an efficient way“.
“The Kudelski Security team played an important role in auditing every aspect of our smartcard wallet code. With their defense-in-depth approach to security, they provided in a timely and professional way, the adequate defenses to deliver our solution to the market with confidence”
This article is a practical summary of the top five areas, common to all major security standards and frameworks, which crypto exchange companies need to engage with, in order to protect their platform. Understand Risks and Threats Business Process Controls Policies and Procedures Vendors and Third Parties Security Vulnerabilities and Operational Capabilities (Pen Test!) According […]
Have you ever heard of Functional Encryption (FE)? If so, you may be associating it with some sort of homomorphic encryption, which is not wrong, […]
You have probably heard about some big announcement by Google on the topic of “quantum supremacy”, and maybe also about a rebuttal by IBM criticizing […]
Binance created an open source software library available on Github implementing a threshold ECDSA signature scheme (TSS), and hired Kudelski Security to perform a security […]
KZen hired Kudelski Security to perform a security assessment of their Multi-party ECDSA library and provided us access to their source code and associated documentation. […]