Symmetric Authentication Explained At The Example Of The Atmel ATSHA204A
A crypto system should be secure even if everything about the system, except the key, is public knowledge – Kerckhoff’s law (from the…
6 Questions You Need To Answer To Protect Your System
Two weeks ago we defined several questions to find out if your application needs security. Now it’s time to think about what to…
9 Questions to Find Out if Your Application Needs Security!
The Internet of Things (IoT) was at the peak of Gartner’s Hype Cycle 2014 – just a couple months later it feels like it has…
Secure It Now!
By the end of last year complex spying malware arrived via an USB stick to the work computer of the unit head in…