News, ideas, and perspectives on security, safety, and privacy in
Communications, IIoT, and beyond.

Cyberattacks in 2021: Lessons Learned

December 27, 2021
| Kylee Malkiewicz

With 2021 coming to a close, let’s look back at some of the cyberattacks we’ve seen this year, and discuss what we can expect for 2022. 

Security Communications IIoT

Here’s How to Protect Firmware Against Cyberattack

November 04, 2021
| Kylee Malkiewicz

In recent years, we have seen a significant rise in attacks on firmware.  A survey conducted by Microsoft concluded that in the last four years, there has been a 500% increase in reported firmware attacks, and 83% of surveyed businesses reported a...

Privacy Semiconductors

What's the Deal with Crypto Agility?

October 27, 2021
| Steve Milburn

Today, there is no shortage of cryptographic technology to choose from. Providers of popular crypto solutions include the original creator, IBM, as well as other major corporations, like Microsoft, and startups, like PQShield and AgilePQ

Privacy Semiconductors

What Biden’s Latest Cybersecurity Initiative Means for the Future of Embedded Systems

October 19, 2021
| Kylee Malkiewicz

You may have noticed that cyberattacks on critical infrastructure have been on the uptick in recent months. Targets have ranged from a water treatment facility in Florida, which ultimately failed, to the Colonial Pipeline, which succeeded in...

Security

Why Are Buffer Overflows So Dangerous?

October 11, 2021
| Kylee Malkiewicz

We talk about buffer overflows a lot. So much so, it almost seems silly to be writing another article dedicated to this software vulnerability. But, it’s worth driving the point home: buffer overflows are one of the most dangerous software...

Security

Comparing Armv9 Security Features & Dover’s CoreGuard Technology

October 05, 2021
| Greg Sullivan

In March 2021, Arm announced the release of its new Armv9 architecture. The first new architecture in a decade, Armv9 includes new security features—from compartmentalization to memory safety to pointer authentication.

Security Semiconductors

An Analysis of Recent Changes to MITRE’s CWE Database

August 30, 2021
| Leslie Barthel

The ever-expanding universe of cybersecurity threats plaguing embedded systems today is  only getting more dangerous, costly, and pervasive with every year that passes.

Security

Stopping the Most Common CWE Threats in Embedded Systems

August 17, 2021
| Leslie Barthel

The threat universe for embedded systems is seemingly endless. To try to make sense of it all, we turn to MITRE’s CWE database. It’s a publicly-available, community-developed list of software and hardware weaknesses. Its purpose is to serve as a...

Security

A Q&A on Securing Embedded Systems

August 12, 2021
| Kylee Malkiewicz

In order to make sense of the many threats plaguing embedded systems today, we turn to MITRE’s Common Weakness Enumeration (CWE) database. This database serves as a tool to help categorize the tens of thousands of common vulnerabilities and...

Security

Everything You Need to Know About CWEs

July 21, 2021
| Kylee Malkiewicz

In order to understand the many potential cyberattacks that threaten you and your organization, we turn to MITRE’s Common Weakness Enumeration (CWE) database as a key first step.

Security