While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”. The idea of hardware as an uncrackable vault was rocked by this month’s announcement of two major cybersecurity flaws in Intel chips, Meltdown and Spectre. Meltdown and Spectre caused widespread panic and raised […]
On May 11th President Trump signed a Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the highest cybersecurity risks faced by executive departments and agencies. Known vulnerabilities include using operating systems or hardware beyond the vendor’s […]
The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet. This event was especially felt in Washington, D.C. where there seems to be an uptick in the amount of Government activism and IoT […]
There is an interesting story in the Bible about Moses and his father-in-law Yitro. Yitro visits Moses and sees him sitting in his tent day and night as thousands of people ask for his advice. Yitro advises his son-in-law to set up a court system where he would delegate the easy problems to lower level […]
What can Cam Newton teach us about embedded software cybersecurity? His answer to a reporter’s question following Carolina’s win over the Arizona Cardinals tells us everything we need to know.
TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security. This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed by any programmer creating embedded software and any program manager concerned about the security of their embedded software. To read […]
The Department of Defense released its report on defense spending by State for 2014. See how your State and County performed.
In the past two weeks TELEGRID engineers gave presentations on Embedded Software Security and attended talks on M2M cybersecurity, IPv6 security flaws, and personal cybersecurity best practices. Since TELEGRID designs embedded software security tools for the US Military all of these talks were aimed at the Government. As we sat and listened we began to […]