HSM – What it is and how it works
Encrypted data is not secure if the keys used for encryption are...
We dive into relevant and interesting topics of security for embedded systems. The blog covers topics such as post-quantum or classic cryptography, but also security regulations affecting embedded systems.