News, ideas, and perspectives on security, safety, and privacy in
Communications, IIoT, and beyond.

Stopping the Most Common CWE Threats in Embedded Systems

August 17, 2021
| Leslie Barthel


The threat universe for embedded systems is seemingly endless. To try to make sense of it all, we turn to MITRE’s CWE database. It’s a publicly-available, community-developed list of software and hardware weaknesses. Its purpose is to serve as...

Security CoreGuard Defense-in-Depth

A Q&A on Securing Embedded Systems

August 12, 2021
| Kylee Malkiewicz

In order to make sense of the many threats plaguing embedded systems today, we turn to MITRE’s Common Weakness Enumeration (CWE) database. This database serves as a tool to help categorize the tens of thousands of common vulnerabilities and...

Security CoreGuard Defense-in-Depth

How to Secure Systems with Fine-Grained Compartmentalization

June 30, 2021
| Kylee Malkiewicz

Compartmentalization is one of the seven layers in the Cybersecurity Stack. It works by separating data and software on a processor into different compartments to effectively limit the scope of damage of potential cyberattacks only to the...

Security CoreGuard Defense-in-Depth

Here's Everything You Need to Know About the Baron Samedit Bug

June 08, 2021
| Jothy Rosenberg

In January 2021, a major buffer overflow vulnerability, impacting a large chunk of the Linux ecosystem, was discovered in the sudo application by security auditing firm, Qualys. The vulnerability, known widely as “Baron Samedit,” received a CVE...

Security CoreGuard Defense-in-Depth

BadAlloc: The Latest Buffer Overflow Vulnerability Impacting the IoT

May 24, 2021
| Kylee Malkiewicz

It wasn’t too long ago that we wrote a roundup of the severe buffer overflow vulnerabilities discovered in the just the first quarter of 2021, but the all-too-common bug has made the news yet again. 

Security CoreGuard IIoT

How the DoD Orange Book Paved the Way for Modern Cybersecurity

May 12, 2021
| Jothy Rosenberg

Solving the problem of how to prevent cyberattacks has been a priority even before the first internet-born cyberattack, the Morris Worm. It was a buffer overflow attack that spread rapidly and became a viral denial of service attack and it was...

CoreGuard Defense-in-Depth

Is Quantified Cybersecurity Assurance Possible?

May 05, 2021
| Greg Sullivan

It is often difficult to evaluate the current offerings of cybersecurity products against the needs of a particular software-intensive, safety-critical platform. One reason for this is the collection of grand but unsubstantiated claims of...

Security CoreGuard Privacy

A Q&A on Lessons Learned from SolarWinds

April 29, 2021
| Team Dover

SolarWinds first made headlines in December 2020, but nearly six months later, more information about the attack continues to come to light. From the execution method to the implications for securing the software supply chain—we’ve learned many...

CoreGuard Defense-in-Depth

Here's What You Need to Know About Supply Chain Attacks

April 14, 2021
| Kylee Malkiewicz

As information about the SolarWinds attack continues to come to light, a new focus is being placed on the software supply chain and the cybersecurity risks it poses. The frequency and popularity of software supply chain attacks (also known as...

Security CoreGuard Defense-in-Depth

How to Secure Private 5G Networks

March 24, 2021
| Kylee Malkiewicz

A private 5G network is a wireless Local Area Network (LAN) that licenses 5G technologies inaccessible to the public. For organizations  that are ready to take advantage of 5G technology, the option of a private 5G network is particularly...

CoreGuard Defense-in-Depth IIoT