There’s no doubt 2018 was an important year in cybersecurity, as a number of national stories and unfortunate attacks lifted the public’s awareness of the issues at hand like never before.
From the government’s seeming inability to cope with Russian and Chinese cyber intrusions, to our new found understanding of the threats cybercriminal groups pose, the cybersecurity question can no longer be ignored.
All along the way, we’ve been keeping up with current events, trying to make sense of all the chaos through the Dover Blog.
So, as 2019 gets underway, we thought it’d be a good idea to revisit some of our readers’ favorite posts from the year that was. Here’s a recap of our top 10 cybersecurity blogs from 2018:
How RISC-V is Changing the Game
The RISC-V instruction set architecture (ISA) might have come from UC Berkeley way back in 2010, but 2018 was the year where it came of age. As our team put it back in March, the open-source ISA saw fast-growing adoption and promise for a secured processing future. Read on to learn more about how RISC-V is changing processor design as we know it.
What You Need to Know About Building More Secure Processors
Security is rarely seen as a hardware issue today, so vendors are reluctant to bake security into their processors. While you might find a processor with cryptographic or compartmentalization capabilities, no one has yet to fully implement a proper cybersecurity stack. In this blog from October, we take a look at some of the most important elements of the cybersecurity stack—the essential building blocks of a secure processor.
The Internet of Things (IoT) is Dangerous. But it Doesn’t Have to Be.
Ask the average joe to describe the Internet of Things (IoT) and you typically get an answer that has to do with connected coffee pots and smart light bulbs. While true, the IoT is actually much larger and much more critical to our everyday lives. Cybersecurity experts fear that the IoT can amplify the damage cyberattacks can cause, and yet many devices today are shipped with lacking security features, at best. Dover CEO and Founder Jothy Rosenberg takes a look at how we can solve the IoT cybersecurity problem, in this post from November.
Meltdown and Spectre Reaffirm Dover’s Mission
Few cyberattacks have garnered the media coverage as Meltdown and Spectre did in 2018. And, while Intel scrambled to respond, and bad actors cranked up the pressure, the industry was left wondering, “how can we create processors moving forward that are inherently immune to these types of flaws?” In a note from Dover CEO and Founder Jothy Rosenberg in January, we see how CoreGuard® was built to address exactly these types of problems.
The Return of Ransomware & How It Impacts You
Vying for top position as the most devastating attack of the year, Wannacry affected windows computers across the world, wreaking havoc on everyone from Boeing to the UK’s National Health System. And, while it might seem like ransomware is a problem only for businesses and major institutions, its rise in use by attackers in 2018 showed just how far-reaching the impact of these attacks can be. Our team takes a deep dive on ransomware and its effects, in this April blog.
IoT: Where’s the Security?
Sure the IoT brought us smart speakers and thermostats, but it also made it possible for bad actors to string these smart devices together into massive botnets capable of taking down power plants. Why? Back in September, we took a deep dive into the current state of IoT cybersecurity (or lack thereof) to answer that question. Read on to learn more about today’s IoT landscape and why cybersecurity is about to be a non-negotiable for device makers.
How To Stop Bleedingbit CVE-2018-16986 at the Core
Businesses and hospitals, in particular, got a scare in November when they learned many of their network access points were vulnerable to a Bluetooth-based attack. Bleedingbit CVE-2018-16986 affected potentially millions of devices but could have been prevented if the embedded systems were protected with CoreGuard®. Read on to learn how.
Sorting Out Security: Making Sense of Today’s Solutions
One of the dirty little secrets about cybersecurity is that there’s no one-size-fits-all solution. While many vendors claim to sell “secure” products, what they really mean is that their products have cryptography, or some form of compartmentalization. This is the wrong way to look at cybersecurity, as embedded systems can only be truly secured through a layered approach. Here, Dover CEO and Founder Jothy Rosenberg takes a look at today’s cybersecurity solutions landscape and explains why these solutions should never stand alone.
Top 5 Automotive IoT Safety Innovations
With all of the major stories surrounding the cybersecurity space in 2018, the automotive segment probably didn’t get nearly as much coverage as it deserved. New innovations from manufacturers like Tesla and Ford are pushing more and more tech into cars, and security is quickly becoming a concern. In this post from January, our team took a look at some of the most important safety innovations to date.
How CoreGuard® Supports More Secure Compartmentalization
While compartmentalization alone is no security solution, it is a critical part of the overall security stack. In this blog from November, we take a look at how CoreGuard can be leveraged in the cybersecurity stack to support the most secure version of compartmentalization available on the market today. Read on to learn more.
Want to stay more informed in 2019? Subscribe today and we’ll send content like this directly to your inbox.