Ransomware and 3 Rays of Hope

Ransomware and 3 Rays of Hope

Posted on Posted in Cyber Security

This week we received news of another global ransomware attack that has reportedly affected FedEx, Rosneft, Moller-Maersk, and Merck.  This comes hot on the heels of last month’s WannaCry ransomware attack that affected 300,000 computers in 150 countries.  It seems these two attacks are linked because they both use the Server Message Block (SMB) protocol […]

Offline LINUX Repository

Does President Trump Want an Offline LINUX Repository?

Posted on Posted in Cyber Security, Embedded Software, Programming

On May 11th President Trump signed a Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.  In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the highest cybersecurity risks faced by executive departments and agencies.  Known vulnerabilities include using operating systems or hardware beyond the vendor’s […]

Assured Identity – Giving Apps the Finger

Posted on Posted in Authentication, Cyber Security

I recently returned from the AFCEA Defensive Cyber Operations Symposium where one of the main topics was Assured Identity, particularly as it pertains to Mobility.  The DoD’s Public Key Infrastructure (PKI) is well established as is the use of two-factor authentication via a Common Access Card (CAC).  However, with the proliferation of mobile devices, CAC […]

10 Commandments of Embedded Software Security

Posted on Posted in Cyber Security, Embedded Software, Programming

TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security.  This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed by any programmer creating embedded software and any program manager concerned about the security of their embedded software.  To read […]