Home Device Security Bulletin: the latest Riscure updates

Device Security Bulletin: the latest Riscure updates

Riscure shares knowledge. Every month, we send a Device Security Bulletin. You probably wonder: what is Device Security Bulletin, and why should you follow it?

Security Highlight – the star of Device Security Bulletin

Every bulletin starts with a Security Highlight blog post. In these blog posts, Riscure security experts reflect on the recent industry updates or news. Not only do they help to understand readers what these news mean to them, but they also suggest possible solutions and action points.

Device Security Bulletin keeps you updated

As with many other companies, Riscure is always busy with new projects. Developments and events. We know that sometimes it can be hard to keep up with the news. To make it easier for you, we summarize key news and updates in Device Security Bulletin. These updates include:

  • Events and webinars hosted and attended by Riscure worldwide
  • R&D in forms of blogs and publications
  • News about collaborations
  • Stories of Riscure employees

We want to improve

We are always looking for feedback from our readers. If you want to share your opinion with us, please, send it to us at inforequest@riscure.com.

Recent Security Highlights

Security Highlight: Is AI ready for finding security vulnerabilities?

Security Highlight: Is AI ready for finding security vulnerabilities?

Big Sleep's breakthrough in discovering an SQLite vulnerability demonstrates how AI can reduce the opportunity window for attackers, marking a new era in vulnerability research.
Security Highlight: China’s Quantum Leap, and Why RSA Isn’t at Risk (Yet)

Security Highlight: China’s Quantum Leap, and Why RSA Isn’t at Risk (Yet)

Recent headlines suggested that Chinese scientists have the potential to break military-grade RSA encryption using quantum computers, causing concerns over online data security.
Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Reading the EUCLEAK paper provides a detailed journey through the ups and downs of carrying out a blackbox attack.