Cysec

WHAT IS CONFIDENTIAL COMPUTING?

As the digital transformation continues to accelerate around the globe, security and privacy have struggled to keep pace. Encryption only goes so far. It can prevent unauthorized eyes’ viewing and using sensitive data while it’s in storage and during transmission. But while that data is being processed in a CPU – “in use” — it is vulnerable, …

WHAT IS CONFIDENTIAL COMPUTING? Read More »

CYSEC PARTNERS WITH D-ORBIT

LAUSANNE, Switzerland, July 5th, 2021 – CYSEC SA, a cybersecurity company pioneering off-the-shelf, end-to-end security products for commercial space missions, selected D-Orbit, the space transportation company, and its ION Satellite Carrier to perform the in-orbit demonstration of its product ARCA Space in Q1 2022. READ MORE

CYSEC PARTNERS WITH ARMASUISSE CYBER DEFENCE CAMPUS

Lausanne, June 25th, 2021 – Cyber threats are not only affecting private entities but also public and governmental organizations. To foster technology advances in the field of cybersecurity, the Federal Department of Defence, Civil Protection and Sport through its armasuisse Science and Technology branch has created in January 2019 the Cyber Defense Campus (CYD Campus). Based …

CYSEC PARTNERS WITH ARMASUISSE CYBER DEFENCE CAMPUS Read More »

PROTECTING HEALTH DATA ON PUBLIC CLOUD WITH HOSTEUR & CYSEC

October, 2021 – HOSTEUR concluded a strategic partnership with CYSEC to guarantee the high security level for its customers’ critical data. The cloud hosting provider has selected CYSEC for the provisioning of natively encrypted Kubernetes clusters. Thanks to this partnership, HOSTEUR’s end customers will be able to benefit from an optimal confidentiality while profiting from the …

PROTECTING HEALTH DATA ON PUBLIC CLOUD WITH HOSTEUR & CYSEC Read More »

whats is confidencial computing CYSEC

October, 2021 – HOSTEUR concluded a strategic partnership with CYSEC to guarantee the high security level for its customers’ critical data. The cloud hosting provider has selected CYSEC for the provisioning of natively encrypted Kubernetes clusters. Thanks to this partnership, HOSTEUR’s end customers will be able to benefit from an optimal confidentiality while profiting from the …

whats is confidencial computing CYSEC Read More »

DIFFERENTIAL POWER ANALYSIS ON SIKE – PART 1

Modern cryptography is threatened by the arrival of quantum computers. Indeed, Shor’s quantum algorithm (a quantum algorithm) can be used to break modern cryptography in polynomial time due to a quantum boost in the factorization problem.  As a response, the National Institute of Standards and Technology (NIST) launched a call for standardization of quantum-resistant algorithms. …

DIFFERENTIAL POWER ANALYSIS ON SIKE – PART 1 Read More »

Confidental computing whith Cisec arca & AMD-SEV [Whitepaper]

Enterprises are accelerating their migration to digitalization and to adopting cloud-based services but remain reluctant to move sensitive and mission-critical data and workloads onto the cloud because of concerns that include. Integrity and confidentiality of data, particularly while that data is in use Ownership and management of the security and encryption keys Cloud provider access …

Confidental computing whith Cisec arca & AMD-SEV [Whitepaper] Read More »