Blog

No results found.
My journey at Riscure: Nikola Medic

My journey at Riscure: Nikola Medic

  Nikola Medic, Director of Sales Certification at Riscure, has been helping customers find the best way to meet their product deployment objectives for more than 5 ...
Security Highlight: Hertzbleed – prime time for power side channel countermeasures or novelty attack?

Security Highlight: Hertzbleed – prime time for power side channel countermeasures or novelty attack?

Hertzbleed is a new side-channel attack that turns a power side channel into a timing side channel. That timing side channel may be exploitable even if the algorithm runs in a constant number of ...
My journey at Riscure: Hanna Humenyuk

My journey at Riscure: Hanna Humenyuk

Hanna Humenyuk is an International Sales and Business Development Manager specializing in Mobile Payment Security at Riscure. Before joining Riscure, Hanna worked in FinTech for over 10 years. ...
DRM security trends and future

DRM security trends and future

The security measures implemented on the device determine the overall system level of protection as required by the license.
Security Highlight: Evil Never Sleeps

Security Highlight: Evil Never Sleeps

Recently, Apple introduced a useful but potentially dangerous feature to its iPhones. Most of us would assume that a phone becomes inactive when switched off by the user or, due to low power. ...
My journey at Riscure: Siebe Krijgsman

My journey at Riscure: Siebe Krijgsman

Siebe Krijgsman, Principal Engineer at Riscure, compares fundamental security topics to old action movies. He discusses the differences between various Riscure tools and the challenges of ...
My journey at Riscure: Praveen Vadnala

My journey at Riscure: Praveen Vadnala

Praveen Vadnala, a principal security analyst, encourages companies to consider the security of their devices during all stages of the development lifecycle, and the earlier, the better.
Security highlight: Attack Stepping Stones

Security highlight: Attack Stepping Stones

Experienced hackers know that successful exploits usually require a series of vulnerabilities, the stepping stones. The combination of these vulnerabilities enables the attack path, and all of ...
Security Highlight: Risks of chip shortage

Security Highlight: Risks of chip shortage

The global chip shortage is leading to a variety of issues in electronics supply chains, from lead times of over two years to ten-fold price increases. Riscure has seen examples of such ...