Articles with tag 'Security'

Trusted

The third part of a blog series, discussing HSM-backed security requirements and how we analyse the tradeoffs offered by modern options.

Microchip

The 2nd part of a blog series, discussing HSM-backed security requirements and how we analyze the tradeoffs offered by modern options.

Car console

As we work increasingly with systems that have HSM-backed security requirements, we analyze the tradeoffs offered by modern options.

fingerprint

In an evermore software-intensive world, the security of software systems has become a critical part of product design and implementation. One way in which attackers exploit software systems is by crafting malicious inputs. The defence to such attacks is a combination of defensive programming techniques including input validation.

Masks, coronavirus and smartphone

As concerns about the privacy and security implications of contract tracing apps for COVID-19 show, establishing trust in software is still a real challenge. I’ve been following reports about these apps closely, and have been interested to read medical, technical and ethical analysis from around the world. What all of these perspectives underline for me is the critical role of public trust in the success or failure of such applications.

Codethink

LONDON--(BUSINESS WIRE)-- The Institute for Strategy, Resilience & Security (ISRS) at University College London (UCL) in association with software developer Codethink Ltd, today announced the release of a new white paper entitled Towards Trustable Software – A Systematic Approach To Establishing Trust In Software. Paul Sherwood, CEO of Codethink will introduce …

Tag Index

Get in touch to find out how Codethink can help you

sales@codethink.co.uk +44 161 660 9930

Contact us