bp6-2

Information Flow Tracking: Enhancing Data Security and Privacy

Author: Jurij Mihelič, Beyond Semiconductor In this blog post, we explore the concept of information flow tracking (IFT) from the field of computer security and its importance in enhancing data…
bp-5

Enhancing IoT Security through Device-to-Device Authentication

Author: Rafał Kochanowski, 3mdeb In the contemporary digital realm, the principle of multi-factor authentication (MFA) has become a cornerstone, especially in sectors like banking. Traditionally…
BLOG-POST-4

Cybersecurity is a Community Effort

Author: David Purón, Barbara IoT  Undoubtedly, deploying Internet of Things (IoT)-connected devices, whether they are sensors, edge gateways, or large equipment, presents significant…
bp3

Enhancing Security in Agricultural UAVs: The Power of Remote Attestation

Author: Malvina Catalano, CYSEC In today's modern agricultural landscape, Unmanned Aerial Vehicles (UAVs), commonly known as agricultural drones, are revolutionizing the way farmers operate.…
silver-bullets

TEEs are not Silver Bullets

Author: David Cerdeira, University of Minho Trusted Execution Environments (TEEs) are secure execution environments that provide hardware-based isolation and protection for Trusted Applications…
BLOGPOST-1

We are open, but formal

Authors: Aljosa Pasic and Marco Roveri A manifesto is a name usually given to a public declaration of beliefs, principles, and intentions, often issued by a group or individual, proposing…