How Exhaustive Static Analysis can Prove the Security of TEEs

icon/arrow Back to news TrustInSoft’s new white paper, How Exhaustive Static Analysis Can Prove the Security of TEEs, explains why organizations that rely on trusted execution environments within their devices should adopt this new technology. The Trusted Execution Environment (TEE) within a processor has become a key component for protecting sensitive data and applications from unauthorized access. To fulfill […]
TrustInSoft Showcases New Offer for Zero-Vulnerability Devices at Mobile World Congress 2022

icon/arrow Back to news Zero-vulnerability software takes center stage at the Mobile World Congress in light of ever-present cyberattacks PRESS RELEASE BARCELONA, Feb. 28th, 2022 – TrustInSoft, a cybersecurity software company, is showcasing its latest offer for zero-vulnerability devices at the Mobile World Congress (MWC), the premier mobile communications trade show taking place from February […]
Why Exhaustive Static Analysis is the key to validating a secure and reliable Trusted Execution Environment

icon/arrow Back to news This post is Part 3 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis Can Prove the Security of Trusted Execution Environments.” To obtain a FREE copy, CLICK HERE. Introduction In Part 1 of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free […]
Why developers need to move beyond software testing to validate a trusted execution environment

icon/arrow Back to news This post is Part 2 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. In the first post of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free of undefined […]
What is a TEE and what are the challenges of validating one?

icon/arrow Back to news This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. Modern consumer technology is increasingly complex, connected, and personalized. Our devices are carrying more and more sensitive data that must be […]
The Software Development Impacts of the Executive Order on Improving the Nation’s Cybersecurity

Back to news Introduction 2020 and 2021 have seen a dramatic increase in cyberattacks on U.S. soil and worldwide. Following the cyber attack on the Colonial Pipeline, considered one of the most serious in U.S. history, President Joe Biden signed an Executive Order on Improving the Nation’s Cybersecurity in May 2021 to increase the cybersecurity of software […]
Bye, bye Pegasus – New Application Security Test

icon/arrow Back to news TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test PRESS RELEASE TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test Bye, bye Pegasus: the new offer allows mobile app developers to prove the absence of vulnerabilities in C and C++ code, libraries, and APIs Cybersecurity software company […]
How to protect your code from Pegasus spyware

icon/arrow Back to news Learn how to stop Pegasus-like attacks and protect your code from buffer overflows and other exploitable vulnerabilities Introduction You may have heard of Pegasus, a surveillance software produced by an Israeli company, the NSO Group, for anti-crime and anti-terrorism purposes. It is back in the news for the alleged spying on 180 […]