TrustInSoft at The International Cybersecurity Forum (FIC) 2022

icon/arrow Back to news At the beginning of June TrustInSoft exhibited at the FIC 2022 with its zero bug offer with TrustInSoft Analyzer TrustInSoft Exhibits at the FIC 2022 TrustInSoft exhibited as partners of Hexatrust at the International Cybersecurity Forum (FIC) at the beginning of June.   The FIC is the leading European event in […]

ERTS 2022 in Toulouse, France

  Back to news TrustInSoft exhibited at ERTS 2022 for the 11th edition of the European Congress Embedded Real Time Systems event in Toulouse, France TrustInSoft at ERTS 2022 June 1-2 TrustInSoft exhibited at ERTS in Toulouse, France at the Diagora Congress Center. This 11th edition of the European Congress for Embedded Real Time Systems […]

C programs that access the representation of addresses: TrustInSoft’s solution

Back to news Where examples listed in a previous post become analyzable Written by Pascal Cuoq Foreword for the present sequel post A previous blog post showed a number of difficulties that ​can arise when analyzing low-level C code, specifically the kind of C code that accesses the representation of addresses. It also claimed that, in a serendipitous fashion, a […]

Proving the Security of Low-Level Software Components & TEEs

icon/arrow Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such […]

5 Best Practices for Secure Coding & its Role in the Future of Cybersecurity

icon/arrow Back to news A collaborative webinar with TrustInSoft CEO Fabrice Derepas and SCADEMY CEO Zoltan Hornak that explores the future of cybersecurity and the best practices for secure coding Watch the Full Exclusive Interview Do you know the difference between undefined, unspecificed, and unexpected behavior in your software? What about why (or if) […]

TrustInSoft Showcases New Offer for Zero-Vulnerability Devices at Mobile World Congress 2022

icon/arrow Back to news Zero-vulnerability software takes center stage at the Mobile World Congress in light of ever-present cyberattacks PRESS RELEASE BARCELONA, Feb. 28th, 2022 – TrustInSoft, a cybersecurity software company, is showcasing its latest offer for zero-vulnerability devices at the Mobile World Congress (MWC), the premier mobile communications trade show taking place from February […]