Do cybersecurity vendors consider user experience? We need to start designing solutions based on both network protection AND network performance.
The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years. If there is no more CAC how can the DoD maintain its PKI?
I recently returned from the AFCEA Defensive Cyber Operations Symposium where one of the main topics was Assured Identity, particularly as it pertains to Mobility. The DoD’s Public Key Infrastructure (PKI) is well established as is the use of two-factor authentication via a Common Access Card (CAC). However, with the proliferation of mobile devices, CAC […]
What can Cam Newton teach us about embedded software cybersecurity? His answer to a reporter’s question following Carolina’s win over the Arizona Cardinals tells us everything we need to know.
TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security. This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed by any programmer creating embedded software and any program manager concerned about the security of their embedded software. To read […]
In the past two weeks TELEGRID engineers gave presentations on Embedded Software Security and attended talks on M2M cybersecurity, IPv6 security flaws, and personal cybersecurity best practices. Since TELEGRID designs embedded software security tools for the US Military all of these talks were aimed at the Government. As we sat and listened we began to […]