cyber security services

securing critical infrastructure from the root up in finance, energy, pharmaceuticals, automotive and IoT.

The Blog

protect IP
Hardware Security
ablackett

Securing IC Design

SECURING IC DESIGN OVERVIEW The old way of delivering a product to market was to reuse as much IP as possible and verify that the

Read More »
rootoftrust training provides the skills to counteract attacks
Hardware Security
ablackett

Attacking Embedded Hardware

ATTACKING EMBEDDED HARDWARE OVERVIEW Embedded devices can be attacked in numerous ways to leak privileged information. These attacks focus on vulnerabilities in the implementation of

Read More »
automotive security and privacy
ablackett

Cyber Security In Cars

Its now common to see electronics in cars controlling all aspects of driving; door entry, steering, braking and safety equipment such as onboard cameras and

Read More »
cyber security
ablackett

Cyber Physical Security

CYBER CRITICAL INFRASTRUCTURE OVERVIEW As governments and national authorities come to grips with cyber warfare, attention has turned to critical infrastructure; so-called because a successful

Read More »
Hardware Security
ablackett

Automotive Security

AUTOMOTIVE SECURITY OVERVIEW The automotive industry has seen a dramatic increase in security measures uptake as manufacturers come to terms with the implications of having

Read More »
secure semiconductor chip
Hardware Security
ablackett

Hardware Trojans

HARDWARE TROJANS OVERVIEW Due to the proliferation of semiconductor and embedded devices in all areas of industry including telecommunications, e-commerce and security, the threat from

Read More »