This blog post is about benchmarking the IoT prototype we have been building for the FENTEC project, using functional encryption. For more information, please see

This blog post is about benchmarking the IoT prototype we have been building for the FENTEC project, using functional encryption. For more information, please see
Kudelski Security recently announced the launch of a new focus on quantum security, including expanded research and advisory services that enable security leaders and product
Co-authored by Nils Amiet and AndrĂ© Nicoulin 1. Introduction In this memo, we address the issue of the “Dangerous Delegated OCSP Responder Certificate” [1]. We propose
Vulnerabilities in supply chains aren’t a new topic and have quite a bit of focus from both a hardware and software perspective. With this post,
In this blog post, we examine six vulnerabilities that we have found in the CloudPlug, a device that collects logs from ICS/SCADA networks and pushes
In a previous blog post, we looked at the unintended effects of feeding random noise to a group of pre-trained neural networks. The subject of