Stay updated
News
& Updates

Composite & Delta Certification: The Next-Gen HSM Approach for Cloud, Telecom & Web3
Reconciling Security Certification and Product Introduction In today’s cloud, telecom and Web3 landscapes, hardware security modules (HSMs) must move faster than ever to support innovation and regulations like eIDAS or
Head of Product ProvenBox
Business Developer ProvenBox 📍Location Location: Paris (75017), France | Permanent contract (CDI) | Hybrid workDomain: Cybersecurity, Embedded Software, Cloud & Edge ComputingScope: Secure product portfolio (ProvenBox, ProvenCore) – Europe &
Business Developer ProvenBox
Business Developer ProvenBox 📍Location Location: Paris (75017), France | Permanent contract (CDI) | Hybrid workScope: Primarily Europe, with possible global engagements 🏢 Company At ProvenRun, our mission is to
Field Application Engineer ProvenBox
Field Application Engineer ProvenBox 📍Location Location: Paris (75017), France | Permanent contract (CDI) | Hybrid workScope: Europe + Global engagements in cloud & embedded security 🏢 Company At ProvenRun,
Field Application Engineer – Embedded Cybersecurity
Field Application Engineer – Embedded Cybersecurity 📍Location Location: Paris (75017), France | Permanent contract (CDI) | Hybrid workScope: Europe + Global engagements in embedded security 🏢 Company At ProvenRun,

ProvenRun participates to secure on-board communications on Ampere’s future SDV platforms
ProvenRun participates to secure on-board communications on Ampere’s future SDV platforms. Paris, 8th January 2024 Through a strategic collaboration, ProvenRun co-develops and provides cybersecurity IP to protect onboard communication on

ProvenRun secures €15 million Series A to accelerate its growth in security-by-design for the Internet of Things (IoT)
ProvenRun secures €15 million Series A to accelerate its growth in security-by-design for the Internet of Things (IoT) Paris, 6th December 2023 – ProvenRun, the cybersecurity software company, announces a

Cybersecurity for the IoT: How Trust Can Unlock Value
Cybersecurity for the IoT: How Trust Can Unlock Value Currently, IoT is at a crossroads, facing a decision between continued incremental value in siloed clusters or unlocking massive value as

Formal Methods: The Optimal Approach for Developing Secure Operating Systems in Embedded Devices
Formal Methods: The Optimal Approach for Developing Secure Operating Systems in Embedded Devices In the realm of cybersecurity for embedded devices, the development of a secure operating system (OS) is