News, ideas, and perspectives on security, safety, and privacy in
Communications, IIoT, and beyond.

Here's Why Today's Cybersecurity is Insufficient

May 27, 2020
| Greg Sullivan

"Cybersecurity" is a broad topic and means different things to different people. In the cybersecurity industry, vendors have tended to tout what they know how to do as "security" and be done with it. However, what vendors tout as sufficient...

CoreGuard Defense-in-Depth

The Most Common Software Exploits Explained

May 12, 2020
| Jothy Rosenberg

There are three guarantees in life: death, taxes, and that software will have vulnerabilities. Through countless tests and studies, it has time and again been proven that for every thousand lines of code, there will be an average of between ...

Security CoreGuard Safety Privacy Defense-in-Depth

The Danger of Cyber-Physical Attacks

March 24, 2020
| Kylee Malkiewicz

In 2014, an unnamed German Steel Mill suffered a sophisticated cyberattack that targeted the industrial control systems of a blast furnace, causing the furnace to shut down improperly. This unstable and improper shutdown caused “massive damage”...

CoreGuard Safety Defense-in-Depth IIoT

AI Needs to Be Secured. Here's How to Do It.

March 23, 2020
| Kylee Malkiewicz

Artificial intelligence (AI) applications are increasingly being integrated into our everyday lives. Smart thermostats use AI to learn our schedules and adjust temperatures, AI applications in self-driving cars enable them to navigate and respond...

Security CoreGuard Safety Privacy Defense-in-Depth

Why Triton is One of the Most Dangerous Pieces of Malware Ever

March 16, 2020
| Kylee Malkiewicz

Ensuring the safety of their systems is a top priority for organizations operating within Industry 4.0. Anything from heavy-duty machinery in a smart factory to environmental sensors in an energy plant—all are potentially dangerous if they don’t...

Security CoreGuard Safety Defense-in-Depth IIoT

Why Stuxnet (Still) Matters: How to Protect Embedded Systems from the World's Most Infamous Malware

March 10, 2020
| Kylee Malkiewicz

There is perhaps no cyberattack more infamous or dangerous than the 2009 Stuxnet attack. It was the first ever weaponized cyberattack. 

Security CoreGuard Safety Defense-in-Depth IIoT

How to Address the Unique Cybersecurity Challenges of Industry 4.0

March 02, 2020
| Kylee Malkiewicz

The Internet of Things (IoT) has evolved dramatically since its conception, and our world alongside it. The advancement of the IoT—including its subset the Industrial Internet of Things (IIoT)—has given way to the latest industrial revolution:...

Security CoreGuard Safety Defense-in-Depth IIoT

Why the IIoT Needs a Complete Cybersecurity Stack

February 13, 2020
| Kylee Malkiewicz

Cybersecurity is a many-pronged approach. From smart thermostats to the automated factories of Industry 4.0, today’s embedded systems require multiple layers of protection to prevent cyberattacks. These different layers are known as the...

CoreGuard Defense-in-Depth IIoT

Defending the IoT: RISC-V's Role in Securing a $470B Market

March 28, 2019
| Jothy Rosenberg

While the Internet of Things may have seemed like a pipe dream of the future just a few years ago, today it’s hard to classify it as anything less than a growing success. In fact, some analysts predict that the IoT is growing so fast, it could...

Security Safety Privacy Defense-in-Depth Communications IIoT RISC-V

Next-Level Data Protection Through Taint Tracking

January 28, 2019
| Sal Trifilio

Data breaches are costing companies millions across the globe, and they’re only getting worse.

According to a breakdown of IBM’s 13th annual Cost of Data Breach survey, “the total cost, per-capita cost, and average size of a data breach (by...

CoreGuard Privacy Defense-in-Depth Communications IIoT