Securosys Blog
Insights on Innovations and Best Practices in Cybersecurity
All Blog Articles
By Robert Rogenmoser Sep 12, 2024How SASE and HSM Enhance Cloud Security Together
Learn how combining SASE and HSM strengthens cloud security by protecting encryption keys and enabling secure remote access. Read our Blog article! Read more By Robert Rogenmoser Aug 21, 2024Securosys: Ready for the Post-Quantum Cryptography Era
Discover how Securosys is leading the way in post-quantum cryptography with the launch of the Primus X Cyber Vault, designed to safeguard your data against future quantum threats. Learn how to transition seamlessly to NIST's newly released quantum-safe algorithms and ensure your organization is ready for the post-quantum era. Read more By Roni Marti Jul 23, 2024Say Hello to Cloud Console: Your New Destination for CloudHSM Services
To meet the growing demand in CloudHSM, Securosys has built Cloud Console, a custom-built web application that provides access to our CloudHSM services. Read more By Robert Rogenmoser Jun 26, 20244 Ways to Secure Your Data in Public Clouds in 2024
Businesses embrace public clouds for efficiency, but data security concerns persist. This article proposes strategies for data protection and sovereignty. Read more By Andreas Curiger Jun 26, 2024Navigating the quantum era: Understanding qubits and their implications for cybersecurity
Blockchain technology can dramatically improve retail efficiency by enabling fully digital processing and eliminating unneeded intermediaries. It is used for tokenized goods, smart contracts and crypto currencies. However, a challenging problem remains. Read more By Audrey Fily Jun 26, 2024Achieving Data Sovereignty on AWS: The Role of External Key Stores
Explore the world of External Key Stores (XKS) and their pivotal role in ensuring data sovereignty on Amazon Web Services (AWS). Read more By Robert Rogenmoser May 23, 2024Manufacture in Switzerland? The perfect solution for security equipment!
A few weeks ago we attended a lecture by Adi Shamir, the co-inventor of the RSA encryption algorithm. After his talk someone asked him how to build a HSM. In fact, we are building a HSM - a hardware security module at Securosys. Obviously we were very interested in his answer. Read more By Andreas Curiger May 23, 2024Internet of Things - Where are all the keys?
The Internet of Things (IoT) is changing the business world. The ability to collect and evaluate data from billions of devices and sensors across ecosystems scattered around the world enables companies to make informed decisions and take immediate action. Read more By Robert Rogenmoser May 23, 2024Spectre and Meltdown make servers unsafe - for years to come!
So you are running your system on Azure or AWS. Why not, it is easy and quick to get going. It is scalable thanks to the many servers available and the virtualization environment. What could go wrong? Read more By Robert Rogenmoser May 23, 2024Security for the Internet of Things
The Internet of things is here, billions of things are already out there and 100x more devices are going to be deployed. They improve our life and reduce cost in areas like Lighting, Health, Sensing, and Connected Video, however privacy, security, and authenticity are often just assumed. Read more By Robert Rogenmoser May 23, 2024HSM in the cloud - what to watch out for?
Hardware Security Modul and cloud seem to be incompatible opposites. We associate cloud with the attribute „insecure“. In contrast, HSMs are supposed to be highly secure. So how can we secure HSM in the cloud? Securosys' CEO Robert Rogenmoser explains what to watch out for if you consider such a service. Read more By Andreas Curiger May 23, 2024How to avoid Zero-Day attacks in networking equipment
The detection of software vulnerabilities in network components is a difficult task. Moreover, whoever has identified such a software bug will thoroughly consider what to do with this newly acquired piece of knowledge. Read more By Robert Rogenmoser May 23, 2024Safekeeping of Crypto Assets
A piece of paper, a USB key - is this really the way I should keep my crypto assets? Well, if it is just for myself, and the value of crypto coins does not exceed a few hundred bucks, then storing my private key that way might be good enough. Read more By Andreas Curiger May 23, 2024Growing up
Only 8% of all startups survive for more than 1000 days. We passed this milestone over the holidays. We must have done something right! Securosys is growing up! Read more By Marcel Dasen May 23, 2024Why a hardened server is not good enough to store crypto assets and how to reliably store crypto assets
Blockchain technology can dramatically improve retail efficiency by enabling fully digital processing and eliminating unneeded intermediaries. It is used for tokenized goods, smart contracts and crypto currencies. However, a challenging problem remains. Read more By Andreas Curiger May 23, 2024Quantum Computers - A threat for PKI?
What are the prerequisites for a secure PKI today? Will quantum computers make PKIs obsolete in the future? Could blockchain provide a solution? Read more By Robert Rogenmoser May 23, 2024GDPR Database Encryption
GDPR mandates that as from May 28 2018 on data of natural persons from the EU, such as customer data is safeguarded and access to is controlled. The only technical measure mentioned in the law is encryption. Read more By Robert Rogenmoser Aug 09, 2022How to keep your business running in a world full of cyber security risks
Cyber security is a constant topic in the news. There is not a single day without the headline that passwords were stolen, companies breached, or data or bitcoins lost. Robert Rogenmoser, CEO of Securosys recommends some best practices and solutions to protect systems and data. Read more By Andreas Curiger May 05, 2022Segregation of Duties done right
Many business processes can be problematic or faulty if they are executed by a single person in a company. The principle of segregation of duties (SoD) is used to prevent this. Read more By Marcel Dasen Jul 19, 2021Escape Ransomware and Data Theft
Ransomware criminals encrypt the victim's data and promise to hand over the key in exchange for the ransom. The best plan to make such attacks useless is to have an effective mitigation plan in place for the case. Read more By Tomas Forgac May 20, 2020Protecting the crypto-stash with Multisig, MPC, and HSMs: Part IV
Securosys compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies. Read more By Tomas Forgac Apr 30, 2020Protecting the crypto-stash with Multi-Signature, MPC, and HSMs: Part III
Securosys compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies. Read more By Tomas Forgac Mar 12, 2020Protecting the crypto stash with Multi-signature, Multi-Party-Computation, and HSMs: Part II
Securosys compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies and assets while also meeting operational, business, and regulatory requirements. Read more By Tomas Forgac Feb 05, 2020Protecting the Crypto Stash with Multi-signature, Multi-party Computation and HSMs: Part I
Securosys compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies and assets while also meeting operational, business, and regulatory requirements. Read more By Robert Rogenmoser Jan 31, 2020Quality and reliability, anybody?
How do we ensure that our customers have the very best products in their data centers? Read moreNothing to be found
Load more