Industry insights, product thinking, and commentary on the future of silicon security from the zeroRISC team.
The EU CRA enters enforcement in 2027 — and it changes the compliance calculus for every hardware manufacturer selling into Europe. Here is what RISC-V teams need to understand now.
Read MoreProprietary security architectures in embedded hardware are not just philosophically wrong — they are operationally fragile. A look at the evidence and the alternative.
Read MoreSoftware supply chain security gets all the attention. But the most dangerous attacks start before the first line of firmware is ever written. Why silicon-level attestation changes the equation.
Read MoreZero trust requires verifiable device identity. For embedded systems, that identity must be hardware-anchored. Here is what a credible zero-trust architecture for RISC-V device fleets looks like.
Read MoreNIST finalized its post-quantum standards in 2024. For hardware teams, the decisions made today about cryptographic agility will determine whether the migration is manageable or catastrophic.
Read MoreHardware security due diligence has matured. Here is what sophisticated investors are asking hardware founders, and how to answer credibly.
Read MoreFor security-sensitive applications, how does RISC-V stack up against ARM? An honest technical assessment of where each architecture leads, lags, and offers structural advantages.
Read MoreOpenTitan is the first open-source silicon root of trust. Here is what it is, how it works, and why zeroRISC builds on its foundation for RISC-V hardware security.
Read MoreOur Research Lab publishes peer-reviewed articles on RISC-V security architecture, root of trust implementation, and verified firmware design.
Talk to the zeroRISC team about your RISC-V security architecture. We are engineers who enjoy working through hard problems.
Get in Touch