News, ideas, and perspectives on security, safety, and privacy in
Communications, IIoT, and beyond.

Is Quantified Cybersecurity Assurance Possible?

May 05, 2021
| Greg Sullivan

It is often difficult to evaluate the current offerings of cybersecurity products against the needs of a particular software-intensive, safety-critical platform. One reason for this is the collection of grand but unsubstantiated claims of...

Security CoreGuard Safety Privacy Defense-in-Depth

Here's What You Need to Know About Supply Chain Attacks

April 14, 2021
| Kylee Malkiewicz

As information about the SolarWinds attack continues to come to light, a new focus is being placed on the software supply chain and the cybersecurity risks it poses. The frequency and popularity of software supply chain attacks (also known as...

Security CoreGuard Safety Privacy Defense-in-Depth

Cybersecurity at the Edge

February 09, 2021
| Kylee Malkiewicz

Edge computing is simply the processing of data closer to the data source—instead of relying on the cloud or a centralized data center to do the computing. Edge devices compute data locally and provide an efficient means of transmitting and...

Security CoreGuard Safety Defense-in-Depth IIoT

SolarWinds Highlights the Need for Defense-in-Depth Cybersecurity 

December 22, 2020
| Greg Sullivan

To say 2020 has been a tumultuous year is an understatement. The seemingly never-ending breaking news cycle in the last twelve months has included a global pandemic, a history-making US presidential election, and a steady slew of cyberattacks...

Security CoreGuard Defense-in-Depth

How to Secure Critical Network Infrastructure Against Cyberattacks

December 10, 2020
| Kylee Malkiewicz

Telecommunications companies are a prime target for cyberattackers. Whether it’s a private group infecting systems with ransomware in the hopes of monetary gain or state-backed organizations attempting to spy on adversaries, telcos have...

Security CoreGuard Safety Privacy Communications

How CoreGuard Exceeds Microsoft's Properties of Highly Secure Devices

October 20, 2020
| Greg Sullivan

In Microsoft’s white paper, Seven Properties of Highly Secure Devices, Microsoft researchers outline the seven “must-haves” for devices that claim security and safety. As argued in the paper, all too often security is sacrificed in the name of...

Security CoreGuard Safety Privacy Defense-in-Depth

How CoreGuard Can Protect Every Level of the Azure Sphere Platform

August 24, 2020
| Greg Sullivan

Microsoft Azure Sphere is a secure application development platform with built-in security and communications features for IoT devices. The platform is made up of both hardware and software components, including a crossover MCU, a custom...

Security Privacy Defense-in-Depth Communications IIoT

5G is Here. How Can We Secure It?

June 09, 2020
| Kylee Malkiewicz

Before we can begin to tackle the cybersecurity issues created by the introduction of 5G, it’s important to first understand what exactly 5G is. Don’t worry, it’s wavelengths don’t damage your immune system, nor is it responsible for the spread...

Security Safety Privacy Communications

The Most Common Software Vulnerabilities Explained

May 12, 2020
| Jothy Rosenberg

There are three guarantees in life: death, taxes, and that software will have vulnerabilities. Through countless tests and studies, it has time and again been proven that for every thousand lines of code, there will be an average of between ...

Security CoreGuard Safety Privacy Defense-in-Depth

AI Needs to Be Secured. Here's How to Do It.

March 23, 2020
| Kylee Malkiewicz

Artificial intelligence (AI) applications are increasingly being integrated into our everyday lives. Smart thermostats use AI to learn our schedules and adjust temperatures, AI applications in self-driving cars enable them to navigate and respond...

Security CoreGuard Safety Privacy Defense-in-Depth