Securing IoT, embedded systems, networks, operating systems, hardware and malware reverse engineering.

Embedded systems and wireless technologies provide a target rich environement making it easier to gain access into larger, more complicated infrastructures. 

Identifying and prioritizing vulnerabilities, along with threat modeling and...

... More ... Less
Switch to desktop site