See you at BlackHat USA

Delivering Safety & Cybersecurity Critical Software Faster and Cheaper

Graphic: Critical Systems Blog series part 3: Delivering safety & cybersecurity software faster and cheaper

icon/arrow Back to news How four leading safety-critical systems developers have used TrustInSoft Analyzer to eliminate pesky bugs, guarantee cybersecurity, improve customer relationships, and reduce verification costs Introduction In Part 1 of this series , we discussed why software for safety-critical systems is hitting an “affordability wall,” why reliance on wireless connectivity in those systems is […]

Proving the Security of Low-Level Software Components & TEEs

Graphic: Proving the security of Low-level software components & TEEs

Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such as […]

How Exhaustive Static Analysis can Prove the Security of TEEs

icon/arrow Back to news TrustInSoft’s new white paper, How Exhaustive Static Analysis Can Prove the Security of TEEs, explains why organizations that rely on trusted execution environments within their devices should adopt this new technology. The Trusted Execution Environment (TEE) within a processor has become a key component for protecting sensitive data and applications from unauthorized access.  To fulfill […]

TrustInSoft Showcases New Offer for Zero-Vulnerability Devices at Mobile World Congress 2022

Back to news Zero-vulnerability software takes center stage at the Mobile World Congress in light of ever-present cyberattacks PRESS RELEASE BARCELONA, Feb. 28th, 2022 – TrustInSoft, a cybersecurity software company, is showcasing its latest offer for zero-vulnerability devices at the Mobile World Congress (MWC), the premier mobile communications trade show taking place from February 28th […]

Bye, bye Pegasus – New Application Security Test

Graphic: bye bye project pegasus zero bug mobile application security test

icon/arrow Back to news TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test PRESS RELEASE TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test Bye, bye Pegasus: the new offer allows mobile app developers to prove the absence of vulnerabilities in C and C++ code, libraries, and APIs Cybersecurity software company […]

Mitsubishi Electric R&D Centre Europe creates reliable innovation with TrustInSoft

Graphic: Mitsubishi electric creating reliable innovation with TrustInSoft

  Back to news Mitsubishi Electric R&D Centre Europe faced the challenge of confirming the safety and reliability of more than 300,000 lines of code Who is Mitsubishi Electric R&D Centre Europe (MERCE)? A key component of Europe’s leading R&D community, Mitsubishi Electric R&D Centre Europe (MERCE) researches and develops innovative solutions relating to energy, […]

Beyond the x86_64: developing for embedded systems without development boards

icon/arrow Back to news Challenges of Cross-Platform Development and Solutions  Introduction In embedded software development, one of the first decisions made even before application development is the choice of a hardware platform, which due to its respective constraints and capabilities, can define functionalities of the embedded system once development has begun.  To maintain flexibility so […]

What are the software security implications of 5G?

icon/arrow Back to news Interview with telecommunications expert, Theirry Bonhomme  Thierry Bonhomme is a renowned expert in the telecommunications industry, having served for over 30 years at Orange Group including most recently as CEO of their B2B branch until 2018 (Orange Business Services.) He was in charge of the development of the division that provides […]