bp-5

Enhancing IoT Security through Device-to-Device Authentication

Author: Rafał Kochanowski, 3mdeb In the contemporary digital realm, the principle of multi-factor authentication (MFA) has become a cornerstone, especially in sectors like banking. Traditionally,…
BLOG-POST-4

Cybersecurity is a Community Effort

Author: David Purón, Barbara IoT  Undoubtedly, deploying Internet of Things (IoT)-connected devices, whether they are sensors, edge gateways, or large equipment, presents significant challenges in…
bp3

Enhancing Security in Agricultural UAVs: The Power of Remote Attestation

Author: Malvina Catalano, CYSEC In today's modern agricultural landscape, Unmanned Aerial Vehicles (UAVs), commonly known as agricultural drones, are revolutionizing the way farmers operate.…
silver-bullets

TEEs are not Silver Bullets

Author: David Cerdeira, University of Minho Trusted Execution Environments (TEEs) are secure execution environments that provide hardware-based isolation and protection for Trusted Applications (TAs…
BLOGPOST-1

We are open, but formal

Authors: Aljosa Pasic and Marco Roveri A manifesto is a name usually given to a public declaration of beliefs, principles, and intentions, often issued by a group or individual, proposing…
The subscriber's email address.
Stay informed - subscribe to our newsletter.