George WainblatHow to Hack an Hardware Security Module (HSM)Ever wondered how it’s possible to hack a hardware security module (HSM)? We recently had the opportunity to chat with , researcher at…Jul 3, 20191Jul 3, 20191
George WainblatDevSecOps: Looking at Code Signing HolisticallyCode signing proves the identity of the source vendor of a software (only the private code signing key holder can create the signature)…Jun 27, 2019Jun 27, 2019