Zephyrnet Logo

Tag: hardware security

Auto Network Speeds Rise As Carmakers Prep For Autonomy

In-vehicle networks are starting to migrate from domain architectures to zonal architectures, an approach that will simplify and speed up communication in a vehicle...

Security above everything: why every month is Cybersecurity Awareness Month at Kraken

By Nick Percoco, Kraken Chief Security Officer Cybersecurity cannot be an afterthought for a crypto platform. At Kraken, we consider securing our clients’ personal information...

Security above everything: why every month is Cybersecurity Awareness Month at Kraken – Kraken Blog

By Nick Percoco, Kraken Chief Security Officer Cybersecurity cannot be an afterthought for a crypto platform. At Kraken, we consider securing our clients’ personal information...

Blockdaemon, Ledger Partner for Secure Staking Solutions | BitPinas

Blockdaemon and Ledger have partnered to offer customized enterprise-grade staking solutions for institutional clients. This collaboration aims to create a reliable staking infrastructure by...

A New Architecture And Verification Approach For Hardware Security Modules

A technical paper titled “The K2 Architecture for Trustworthy Hardware Security Modules” was published by researchers at MIT Computer Science and Artificial Intelligence Laboratory...

Research Bits: October 24

Photonic-electronic hardware processes 3D data Researchers from the University of Oxford, University of Muenster, University of Heidelberg, and University of Exeter are developing integrated photonic-electronic...

4 Ways To Implement Bitcoin Governance Strategies | Ledger

Things to know:– Your Ledger devices are extremely useful for letting users self-custody their Bitcoin. But what if you’re an organization, or a financial...

Supply Chain Tips for Software Companies to Avoid Data Breaches

Data breaches are becoming much more common these days. PC Magazine reports that 422 million people were affected by data breaches last year. Preliminary...

Part 6: Genesis of Ledger Recover – Threat Analysis / Evaluation | Ledger

Welcome back to the sixth part of our blog series on Ledger Recover’s genesis!  In the previous parts, we explained how the entropy of...

The Threat Of Supply Chain Insecurity

Concerns about counterfeit chips are growing as more chips are deployed in safety- and mission-critical applications, prompting better traceability and new and inexpensive solutions...

Latest Intelligence

spot_img
spot_img