Insights from the Cybersecurity Market

Why Exhaustive Static Analysis is the key to validating a secure and reliable Trusted Execution Environment

In Part 1 of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free of undefined behaviors (bugs) and why traditional software testing cannot guarantee that every last bug has been eliminated from a piece of code. In Part 2, we looked at why safety–critical industries like aerospace and nuclear energy generation moved away from traditional software testing two decades ago and why developers of TEEs need to follow a similar path today. In this final installment of our series, we’ll explore a new technology called

Read More »

Why developers need to move beyond software testing to validate a trusted execution environment

In the first post of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free of undefined behaviors (bugs) and why traditional software testing cannot guarantee that every last bug has been eliminatedfrom a piece of code. In this post, we’ll explore why industries like aerospace and nuclear energy generation—where much of the code needs to be flawless to assure safety—began moving away from traditional software testing some

Read More »

What is a TEE and what are the challenges of validating one?

This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. Modern consumer technology is increasingly complex, connected, and personalized. Our devices are carrying more and more sensitive data that must be protected. We need to be able to trust our devices to protect both themselves and our data from malevolent hackers. In essence,

Read More »

TrustInSoft’s Exhaustive Static Analysis Proves the Security of Trusted Execution Environments

Paris and San Francisco – November 9, 2021 PRESS RELEASE TrustInSoft’s Exhaustive Static Analysis Proves the Security of Trusted Execution Environments Download New TrustInSoft White Paper and Learn How to Guarantee Devices are Error-free, Secure and Reliable TrustInSoft, a cybersecurity software company, today announced the release of a new white paper “How Exhaustive Static Analysis Can Prove the Security of Trusted Execution Environments (TEEs).” This free white paper explains how exhaustive static analysis can drastically improve

Read More »

Cybersecurity Awareness Month with TrustInSoft

October is #CybersecurityAwarenessMonth! The U.S. Department of Homeland Security and the National Cyber Security Alliance created the National Cyber Security Month (NCSAM) in 2003, since renamed Cybersecurity Awareness Month. It takes place every year during October, to ensure safety and security online. Each week has its own theme to focus on different topics in cybersecurity.  Here’s this year’s plan: The first week aims to highlight the  best cybersecurity practices to keep information safe: doing this,

Read More »

The Software Development Impacts of the Executive Order on Improving the Nation’s Cybersecurity

Introduction 2020 and 2021 have seen a dramatic increase in cyberattacks on U.S. soil and worldwide. Following the cyber attack on the Colonial Pipeline, considered one of the most serious in U.S. history, President Joe Biden signed an Executive Order on Improving the Nation’s Cybersecurity in May 2021 to increase the cybersecurity of software used by federal agencies. In this executive order, President Biden laid out a framework to equip federal agencies with software that

Read More »

Bye, bye Pegasus – New Application Security Test

San Francisco and Paris, September 15th, 2021 PRESS RELEASE TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test Bye, bye Pegasus: the new offer allows mobile app developers to prove the absence of vulnerabilities in C and C++ code, libraries, and APIs  Cybersecurity software company TrustInSoft today announced a new offer for mobile app developers to prove the immunity of their code to cyber threats, in the wake of recent events involving Pegasus

Read More »

How to protect your code from Pegasus spyware

Introduction You may have heard of Pegasus, a surveillance software produced by an Israeli company, the NSO Group, for anti-crime and anti-terrorism purposes.   It is back in the news for the alleged spying on 180 journalists and thousands of human rights activists, discovered in an investigative journalism effort called Project Pegasus.   Pegasus software is designed to collect text messages, intercept phone calls, geolocate the user and copy their passwords. The reason why it has been

Read More »

Sign up for our monthly newsletter to get notified of new articles

Check out our technical article about the difference of using formal methods to upgrade your existing tests

What is TrustInSoft Analyzer?

Learn more about TrustInSoft Analyzer’s unmatched guarantee for the absence of bugs

Check out these popular articles!

Connect with us!

Subscribe to our monthly newsletter!