Home Device Security Bulletin: the latest Riscure updates

Device Security Bulletin: the latest Riscure updates

Riscure shares knowledge. Every month, we send a Device Security Bulletin. You probably wonder: what is Device Security Bulletin, and why should you follow it?

Security Highlight – the star of Device Security Bulletin

Every bulletin starts with a Security Highlight blog post. In these blog posts, Riscure security experts reflect on the recent industry updates or news. Not only do they help to understand readers what these news mean to them, but they also suggest possible solutions and action points.

Device Security Bulletin keeps you updated

As with many other companies, Riscure is always busy with new projects. Developments and events. We know that sometimes it can be hard to keep up with the news. To make it easier for you, we summarize key news and updates in Device Security Bulletin. These updates include:

  • Events and webinars hosted and attended by Riscure worldwide
  • R&D in forms of blogs and publications
  • News about collaborations
  • Stories of Riscure employees

We want to improve

We are always looking for feedback from our readers. If you want to share your opinion with us, please, send it to us at inforequest@riscure.com.

Recent Security Highlights

Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Marc Witteman talks about a recent attack on an open source package and evaluates the possibility of planting malicious functionality in hardware.
Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

This security highlight discusses the recent EM Eye vulnerability discovery, its practical implications, challenges, and potential countermeasures.
Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around "harvest now, decrypt later" attacks: the ability to store ...