Whitepapers

What is Post-Quantum Cryptography?

Learn about post-quantum cryptography, including when we can expect to see quantum computers, what it means for internet security, and how you can protect your organization using NTRU.

Whitepapers | IN CONJUNCTION WITH ROGUE WAVE SOFTWARE, PONEMON INSTITUTE

Car Cybersecurity: What do Automakers Think?

This Ponemon Institute 2015 survey of over 500 automotive developers, engineers, and executives provides new insights to help automotive software suppliers understand the current mindset of their developers and build security and safety into their software.

Whitepapers | IN CONJUNCTION WITH FROST & SULLIVAN

Cybersecurity: Automakers Remain Passive as Government Takes Action

Security Innovation teams up with Frost & Sullivan, a leader in the connected car industry, to analyze key cybersecurity challenges, identify solutions, and capture best practices for building security properly into vehicles.

Whitepapers | IN CONJUNCTION WITH MICROSOFT

Security Engineering Explained

Written by five Microsoft experts and Security Innovation's CTO Jason Taylor, this paper describes the key components of security engineering including identifying secure objectives, creating threat models, performing code reviews, and more.

Whitepapers

Mitigating M2M Software Risks

This guide outlines three must-follow guidelines that embedded software teams should follow to help protect critical M2M systems against failure and malicious attack, including addressing security early on, building security into development, and protecting systems from unauthorized changes.

Whitepapers

Threat Modeling for Secure Embedded Software

Examine threat modeling and learn how it can be used in concert with secure development best practices, including automated source code analysis, peer code reviews, and penetration testing to both identify and mitigate embedded software threats.

Whitepapers | IN CONJUNCTION WITH PONEMON INSTITUTE, GREEN HILLS SOFTWARE

Automotive Cybersecurity: The Gap Still Exists

Read the second annual survey conducted by the Ponemon Institute on automotive cybersecurity. This survey provides insights on the current mindset of automakers in building security and safety into their vehicles.

Datasheets

TSS

TSS provides a set of software components that allows platforms and applications to take advantage of a platform’s TPM in a coordinated, consistent, and portable manner.

Sorry, there are no reports that meet these specifications.