To say 2020 has been a tumultuous year is an understatement. The seemingly never-ending breaking news cycle in the last twelve months has included a global pandemic, a history-making US presidential election, and a steady slew of cyberattacks...
Telecommunications companies are a prime target for cyberattackers. Whether it’s a private group infecting systems with ransomware in the hopes of monetary gain or state-backed organizations attempting to spy on adversaries, telcos have...
5G is often touted for its consumer benefits. Everything from better, more reliable cell phone service to the proliferation of self-driving cars are made possible with 5G. However, the high speed, greater bandwidth, and lower latency of the 5G...
Going Beyond the 7 Properties: How CoreGuard Exceeds Microsoft's Properties of Highly Secure Devices
In Microsoft’s white paper, Seven Properties of Highly Secure Devices, Microsoft researchers outline the seven “must-haves” for devices that claim security and safety. As argued in the paper, all too often security is sacrificed in the name of...
5G is here. The build-up to the rollout of 5G has been years, but in 2020 the world is slowly but surely beginning to connect to and use 5G. In 2020, 160 million devices are projected to connect to the network, with hundreds of millions more...
Microsoft Azure Sphere is a secure application development platform with built-in security and communications features for IoT devices. The platform is made up of both hardware and software components, including a crossover MCU, a custom...
As 5G continues to roll out across the globe, it promises a hyperconnected world with fast downloads and low latency. These benefits of 5G in turn mean more complex systems—AI powered systems like smart cities and autonomous vehicles—are no...
Before we can begin to tackle the cybersecurity issues created by the introduction of 5G, it’s important to first understand what exactly 5G is. Don’t worry, it’s wavelengths don’t damage your immune system, nor is it responsible for the spread...
"Cybersecurity" is a broad topic and means different things to different people. In the cybersecurity industry, vendors have tended to tout what they know how to do as "security" and be done with it. However, what vendors tout as sufficient...
There are three guarantees in life: death, taxes, and that software will have vulnerabilities. Through countless tests and studies, it has time and again been proven that for every thousand lines of code, there will be an average of between ...