Skip to the main content.

Palindrome Technologies

5 min read

From AES to Ascon: How Permutation-Based Ciphers are Redefining Embedded Security in NIST SP 800-232

The proliferation of resource-constrained devices, central to the Internet of Things (IoT) and embedded systems, has introduced a significant cryptographic challenge. Conventional standards, such as AES in GCM mode, were not designed for...

Read More

3 min read

Digital Immunology: Containing Threats with Micro-segmentation

Technical Analysis of the CISA Micro-segmentation Guidance

Read More

5 min read

Unlocking Industrial Cybersecurity: A Deep Dive into ISA/IEC 62443 Standards

In today's interconnected world, where industrial automation and control systems (IACS) are the backbone of critical infrastructure and...

Read More

3 min read

What is the FCC Cyber Trustmark?

The FCC Cyber Trust Mark: Building a More Secure IoT Ecosystem for All

Read More

3 min read

Securing Health: How IEEE 2621 Certification Elevates Medical Device Safety and Trust

The increasing connectivity of medical devices has revolutionized healthcare, offering unprecedented benefits in patient monitoring, diagnosis, and...

Read More

3 min read

Securing Artificial Intelligence (SAI)- ETSI TS 104 223 V1.1.1

The recently published ETSI TS 104 223 V1.1.1 document, "Securing Artificial Intelligence (SAI), Baseline Cyber Security Requirements for AI Models...

Read More

2 min read

Build Secure, Trusted IoT Systems with the IEEE IoT Sensor Devices Cybersecurity Framework

In today's hyperconnected world, every connection introduces new risk and securing your IoT sensor devices is no longer optional, it’s a competitive...

Read More

3 min read

Securing Private 5G Networks- An Introduction

Learn how to protect private 5G networks with expert insights on penetration testing and industry standards.

Read More