<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
90-Day CloudHSM Free Trial – Experience Securosys CloudHSM without commitment.
Start your Free Trial
Products & Solutions
Products & Solutions
Explore our portfolio of cutting-edge cybersecurity solutions, centered around our flagship Hardware Security Modules (HSMs). From encryption and key management to secure access and authentication, our products ensure robust protection for your most critical data and systems.
About
About
Learn more about our mission, explore career opportunities, and access our resources. Discover how we’re shaping the future of cybersecurity and how you can be part of it.
Contact us
  • There are no suggestions because the search field is empty.

All Blog Articles

By Robert Rogenmoser Sep 12, 2024

How SASE and HSM Enhance Cloud Security Together

Learn how combining SASE and HSM strengthens cloud security by protecting encryption keys and enabling secure remote access. Read our Blog article!
Read more
By Robert Rogenmoser Aug 21, 2024

Securosys: Ready for the Post-Quantum Cryptography Era

Discover how Securosys is leading the way in post-quantum cryptography with the launch of the Primus X Cyber Vault, designed to safeguard your data against future quantum threats. Learn how to transition seamlessly to NIST's newly released quantum-safe algorithms and ensure your organization is ready for the post-quantum era.
Read more
By Roni Marti Jul 23, 2024

Say Hello to Cloud Console: Your New Destination for CloudHSM Services

To meet the growing demand in CloudHSM, Securosys has built Cloud Console, a custom-built web application that provides access to our CloudHSM services.
Read more
By Robert Rogenmoser Jun 26, 2024

4 Ways to Secure Your Data in Public Clouds in 2024

Businesses embrace public clouds for efficiency, but data security concerns persist. This article proposes strategies for data protection and sovereignty.
Read more
By Andreas Curiger Jun 26, 2024

Navigating the quantum era: Understanding qubits and their implications for cybersecurity

Blockchain technology can dramatically improve retail efficiency by enabling fully digital processing and eliminating unneeded intermediaries. It is used for tokenized goods, smart contracts and crypto currencies. However, a challenging problem remains.
Read more
By Audrey Fily Jun 26, 2024

Achieving Data Sovereignty on AWS: The Role of External Key Stores 

Explore the world of External Key Stores (XKS) and their pivotal role in ensuring data sovereignty on Amazon Web Services (AWS).
Read more
By Robert Rogenmoser May 23, 2024

Manufacture in Switzerland? The perfect solution for security equipment!

A few weeks ago we attended a lecture by Adi Shamir, the co-inventor of the RSA encryption algorithm. After his talk someone asked him how to build a HSM. In fact, we are building a HSM - a hardware security module at Securosys. Obviously we were very interested in his answer.
Read more
By Andreas Curiger May 23, 2024

Internet of Things - Where are all the keys?

The Internet of Things (IoT) is changing the business world. The ability to collect and evaluate data from billions of devices and sensors across ecosystems scattered around the world enables companies to make informed decisions and take immediate action.
Read more
By Robert Rogenmoser May 23, 2024

Spectre and Meltdown make servers unsafe - for years to come!

So you are running your system on Azure or AWS. Why not, it is easy and quick to get going. It is scalable thanks to the many servers available and the virtualization environment. What could go wrong?
Read more
By Robert Rogenmoser May 23, 2024

Security for the Internet of Things

The Internet of things is here, billions of things are already out there and 100x more devices are going to be deployed. They improve our life and reduce cost in areas like Lighting, Health, Sensing, and Connected Video, however privacy, security, and authenticity are often just assumed.
Read more
By Robert Rogenmoser May 23, 2024

HSM in the cloud - what to watch out for?

Hardware Security Modul and cloud seem to be incompatible opposites. We associate cloud with the attribute „insecure“. In contrast, HSMs are supposed to be highly secure. So how can we secure HSM in the cloud? Securosys' CEO Robert Rogenmoser explains what to watch out for if you consider such a service.
Read more
By Andreas Curiger May 23, 2024

How to avoid Zero-Day attacks in networking equipment

The detection of software vulnerabilities in network components is a difficult task. Moreover, whoever has identified such a software bug will thoroughly consider what to do with this newly acquired piece of knowledge.
Read more
By Robert Rogenmoser May 23, 2024

Safekeeping of Crypto Assets

A piece of paper, a USB key - is this really the way I should keep my crypto assets? Well, if it is just for myself, and the value of crypto coins does not exceed a few hundred bucks, then storing my private key that way might be good enough.
Read more
By Andreas Curiger May 23, 2024

Growing up

Only 8% of all startups survive for more than 1000 days. We passed this milestone over the holidays. We must have done something right! Securosys is growing up!
Read more
By Marcel Dasen May 23, 2024

Why a hardened server is not good enough to store crypto assets and how to reliably store crypto assets

Blockchain technology can dramatically improve retail efficiency by enabling fully digital processing and eliminating unneeded intermediaries. It is used for tokenized goods, smart contracts and crypto currencies. However, a challenging problem remains.
Read more
By Andreas Curiger May 23, 2024

Quantum Computers -  A threat for PKI?

What are the prerequisites for a secure PKI today? Will quantum computers make PKIs obsolete in the future? Could blockchain provide a solution?
Read more
By Robert Rogenmoser May 23, 2024

GDPR Database Encryption

GDPR mandates that as from May 28 2018 on data of natural persons from the EU, such as customer data is safeguarded and access to is controlled. The only technical measure mentioned in the law is encryption.
Read more
By Robert Rogenmoser Aug 09, 2022

How to keep your business running in a world full of cyber security risks

Cyber security is a constant topic in the news. There is not a single day without the headline that passwords were stolen, companies breached, or data or bitcoins lost. Robert Rogenmoser, CEO of Securosys recommends some best practices and solutions to protect systems and data.
Read more
By Andreas Curiger May 05, 2022

Segregation of Duties done right

Many business processes can be problematic or faulty if they are executed by a single person in a company. The principle of segregation of duties (SoD) is used to prevent this.
Read more
By Marcel Dasen Jul 19, 2021

Escape Ransomware and Data Theft

Ransomware criminals encrypt the victim's data and promise to hand over the key in exchange for the ransom. The best plan to make such attacks useless is to have an effective mitigation plan in place for the case.
Read more
By Tomas Forgac May 20, 2020

Protecting the crypto-stash with Multisig, MPC, and HSMs: Part IV

Securosys compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies.
Read more
By Tomas Forgac Apr 30, 2020

Protecting the crypto-stash with Multi-Signature, MPC, and HSMs: Part III

Securosys compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies.
Read more
By Tomas Forgac Mar 12, 2020

Protecting the crypto stash with Multi-signature, Multi-Party-Computation, and HSMs: Part II

Securosys compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies and assets while also meeting operational, business, and regulatory requirements. 
Read more
By Tomas Forgac Feb 05, 2020

Protecting the Crypto Stash with Multi-signature, Multi-party Computation and HSMs: Part I

Securosys compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies and assets while also meeting operational, business, and regulatory requirements. 
Read more
By Robert Rogenmoser Jan 31, 2020

Quality and reliability, anybody?

How do we ensure that our customers have the very best products in their data centers?
Read more