News, ideas, and perspectives on security, safety, and privacy in
Communications, IIoT, and beyond.

BadAlloc: The Latest Buffer Overflow Vulnerability Impacting the IoT

May 24, 2021
| Kylee Malkiewicz

It wasn’t too long ago that we wrote a roundup of the severe buffer overflow vulnerabilities discovered in the just the first quarter of 2021, but the all-too-common bug has made the news yet again. 

Security CoreGuard IIoT

How to Secure Private 5G Networks

March 24, 2021
| Kylee Malkiewicz

A private 5G network is a wireless Local Area Network (LAN) that licenses 5G technologies inaccessible to the public. For organizations  that are ready to take advantage of 5G technology, the option of a private 5G network is particularly...

CoreGuard Defense-in-Depth IIoT

Data Protection at the Industrial Edge

March 03, 2021
| Kylee Malkiewicz

Edge computing is not necessarily a new concept. In fact, the invention of edge computing dates back to 1997 when Akamai introduced its content delivery network, or CDN. 

Since then, edge computing has secured a foothold as an essential component...

CoreGuard Privacy Defense-in-Depth IIoT 5G

Cybersecurity at the Edge

February 09, 2021
| Kylee Malkiewicz

Edge computing is simply the processing of data closer to the data source—instead of relying on the cloud or a centralized data center to do the computing. Edge devices compute data locally and provide an efficient means of transmitting and...

Security CoreGuard Safety Defense-in-Depth IIoT

What Does the IoT Cybersecurity Improvement Act Do?

January 25, 2021
| Kylee Malkiewicz

The Internet of Things—otherwise known as IoT—is the moniker given to all internet-connected devices. Everything from smartphones to self-driving cars to smart sensors in factories, are considered IoT devices.

CoreGuard Defense-in-Depth IIoT

How CoreGuard Can Protect Every Level of the Azure Sphere Platform

August 24, 2020
| Greg Sullivan

Microsoft Azure Sphere is a secure application development platform with built-in security and communications features for IoT devices. The platform is made up of both hardware and software components, including a crossover MCU, a custom...

Security Privacy Defense-in-Depth Communications IIoT

The Cybersecurity Risks of AI and 5G

August 04, 2020
| Kylee Malkiewicz

As 5G continues to roll out across the globe, it promises a hyperconnected world with fast downloads and low latency. These benefits of 5G in turn mean more complex systems—AI powered systems like smart cities and autonomous vehicles—are no...

CoreGuard Safety Defense-in-Depth Communications IIoT

The Danger of Cyber-Physical Attacks

March 24, 2020
| Kylee Malkiewicz

In 2014, an unnamed German Steel Mill suffered a sophisticated cyberattack that targeted the industrial control systems of a blast furnace, causing the furnace to shut down improperly. This unstable and improper shutdown caused “massive damage”...

CoreGuard Safety Defense-in-Depth IIoT

Why Triton is One of the Most Dangerous Pieces of Malware Ever

March 16, 2020
| Kylee Malkiewicz

Ensuring the safety of their systems is a top priority for organizations operating within Industry 4.0. Anything from heavy-duty machinery in a smart factory to environmental sensors in an energy plant—all are potentially dangerous if they don’t...

Security CoreGuard Safety Defense-in-Depth IIoT

Why Stuxnet (Still) Matters: How to Protect Embedded Systems from the World's Most Infamous Malware

March 10, 2020
| Kylee Malkiewicz

There is perhaps no cyberattack more infamous or dangerous than the 2009 Stuxnet attack. It was the first ever weaponized cyberattack. 

Security CoreGuard Safety Defense-in-Depth IIoT