News, ideas, and perspectives on security, safety, and privacy in
Communications, IIoT, and beyond.

How to Secure Systems with Fine-Grained Compartmentalization

June 30, 2021
| Kylee Malkiewicz

Compartmentalization is one of the seven layers in the Cybersecurity Stack. It works by separating data and software on a processor into different compartments to effectively limit the scope of damage of potential cyberattacks only to the...


Here's Everything You Need to Know About the Baron Samedit Bug

June 08, 2021
| Jothy Rosenberg

In January 2021, a major buffer overflow vulnerability, impacting a large chunk of the Linux ecosystem, was discovered in the sudo application by security auditing firm, Qualys. The vulnerability, known widely as “Baron Samedit,” received a CVE...


BadAlloc: The Latest Buffer Overflow Vulnerability Impacting the IoT

May 24, 2021
| Kylee Malkiewicz

It wasn’t too long ago that we wrote a roundup of the severe buffer overflow vulnerabilities discovered in the just the first quarter of 2021, but the all-too-common bug has made the news yet again. 

Safety Semiconductors

How the DoD Orange Book Paved the Way for Modern Cybersecurity

May 12, 2021
| Jothy Rosenberg

Solving the problem of how to prevent cyberattacks has been a priority even before the first internet-born cyberattack, the Morris Worm. It was a buffer overflow attack that spread rapidly and became a viral denial of service attack and it was...


Is Quantified Cybersecurity Assurance Possible?

May 05, 2021
| Greg Sullivan

It is often difficult to evaluate the current offerings of cybersecurity products against the needs of a particular software-intensive, safety-critical platform. One reason for this is the collection of grand but unsubstantiated claims of...


A Q&A on Lessons Learned from SolarWinds

April 29, 2021
| Team Dover

SolarWinds first made headlines in December 2020, but nearly six months later, more information about the attack continues to come to light. From the execution method to the implications for securing the software supply chain—we’ve learned many...

Security Semiconductors

Here's What You Need to Know About Supply Chain Attacks

April 14, 2021
| Kylee Malkiewicz

As information about the SolarWinds attack continues to come to light, a new focus is being placed on the software supply chain and the cybersecurity risks it poses. The frequency and popularity of software supply chain attacks (also known as third...

Security Semiconductors

How to Secure Private 5G Networks

March 24, 2021
| Kylee Malkiewicz

A private 5G network is a wireless Local Area Network (LAN) that licenses 5G technologies inaccessible to the public. For organizations that are ready to take advantage of 5G technology, the option of a private 5G network is particularly attractive...

Privacy Communications IIoT

This Year (So Far) in Buffer Overflows

March 08, 2021
| Kylee Malkiewicz

Yes, you read that correctly. It’s not even two full months into 2021 and we’re already talking about not just one, but several major cyberattacks that all originated as a buffer overflow. 


Data Protection at the Industrial Edge

March 03, 2021
| Kylee Malkiewicz

Edge computing is not necessarily a new concept. In fact, the invention of edge computing dates back to 1997 when Akamai introduced its content delivery network, or CDN. 

Since then, edge computing has secured a foothold as an essential component of...

Privacy IIoT