News, ideas, and perspectives on security, safety, and privacy in
Communications, IIoT, and beyond.

Going Beyond the 7 Properties: How CoreGuard Exceeds Microsoft's Properties of Highly Secure Devices

October 20, 2020
| Greg Sullivan

In Microsoft’s white paper, Seven Properties of Highly Secure Devices, Microsoft researchers outline the seven “must-haves” for devices that claim security and safety. As argued in the paper, all too often security is sacrificed in the name of...

Security CoreGuard Safety Privacy Defense-in-Depth

Why the 5G World Needs Real-Time Attack Detection

September 28, 2020
| Kylee Malkiewicz

5G is here. The build-up to the rollout of 5G has been years, but in 2020 the world is slowly but surely beginning to connect to and use 5G. In 2020, 160 million devices are projected to connect to the network, with hundreds of millions more...

CoreGuard Defense-in-Depth

How CoreGuard Can Protect Every Level of the Azure Sphere Platform

August 24, 2020
| Greg Sullivan

Microsoft Azure Sphere is a secure application development platform with built-in security and communications features for IoT devices. The platform is made up of both hardware and software components, including a crossover MCU, a custom...

Security Privacy Defense-in-Depth Communications IIoT

The Cybersecurity Risks of AI and 5G

August 04, 2020
| Kylee Malkiewicz

As 5G continues to roll out across the globe, it promises a hyperconnected world with fast downloads and low latency. These benefits of 5G in turn mean more complex systems—AI powered systems like smart cities and autonomous vehicles—are no...

CoreGuard Safety Defense-in-Depth Communications IIoT

Here's Why Today's Cybersecurity is Insufficient

May 27, 2020
| Greg Sullivan

"Cybersecurity" is a broad topic and means different things to different people. In the cybersecurity industry, vendors have tended to tout what they know how to do as "security" and be done with it. However, what vendors tout as sufficient...

CoreGuard Defense-in-Depth

The Most Common Software Exploits Explained

May 12, 2020
| Jothy Rosenberg

There are three guarantees in life: death, taxes, and that software will have vulnerabilities. Through countless tests and studies, it has time and again been proven that for every thousand lines of code, there will be an average of between ...

Security CoreGuard Safety Privacy Defense-in-Depth

The Danger of Cyber-Physical Attacks

March 24, 2020
| Kylee Malkiewicz

In 2014, an unnamed German Steel Mill suffered a sophisticated cyberattack that targeted the industrial control systems of a blast furnace, causing the furnace to shut down improperly. This unstable and improper shutdown caused “massive damage”...

CoreGuard Safety Defense-in-Depth IIoT

AI Needs to Be Secured. Here's How to Do It.

March 23, 2020
| Kylee Malkiewicz

Artificial intelligence (AI) applications are increasingly being integrated into our everyday lives. Smart thermostats use AI to learn our schedules and adjust temperatures, AI applications in self-driving cars enable them to navigate and respond...

Security CoreGuard Safety Privacy Defense-in-Depth

Why Triton is One of the Most Dangerous Pieces of Malware Ever

March 16, 2020
| Kylee Malkiewicz

Ensuring the safety of their systems is a top priority for organizations operating within Industry 4.0. Anything from heavy-duty machinery in a smart factory to environmental sensors in an energy plant—all are potentially dangerous if they don’t...

Security CoreGuard Safety Defense-in-Depth IIoT

Why Stuxnet (Still) Matters: How to Protect Embedded Systems from the World's Most Infamous Malware

March 10, 2020
| Kylee Malkiewicz

There is perhaps no cyberattack more infamous or dangerous than the 2009 Stuxnet attack. It was the first ever weaponized cyberattack. 

Security CoreGuard Safety Defense-in-Depth IIoT