<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Embedded Software &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/category/embedded-software/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Mon, 05 Feb 2018 21:59:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>Embedded Software &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hardware’s Burden: Meltdown and Spectre</title>
		<link>https://telegrid.com/meltdown-and-spectre?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=meltdown-and-spectre</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 18:24:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1381</guid>

					<description><![CDATA[<p>While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”.  The idea of hardware as an uncrackable vault was rocked by this month’s &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/meltdown-and-spectre">Hardware’s Burden: Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”.  The idea of hardware as an uncrackable vault was rocked by this month’s announcement of two major cybersecurity flaws in Intel chips, Meltdown and Spectre.  Meltdown and Spectre caused widespread panic and raised questions about the security of Intel chips and the last 20 years of processor design.  Jumping into action Intel was quick to release patches but the impact of these flaws will be felt for years to come.</p>
<p>While it is easy to say that Meltdown and Spectre prove that hardware is just as risky as software, I believe we should instead focus on how we got here.  I believe there is a lesson rooted in our approach to technological innovation as highlighted by Marc Andreessen’s seminal article <a href="https://a16z.com/2016/08/20/why-software-is-eating-the-world/">Why Software Is Eating the World</a>.</p>
<p>Software Defined Everything has become the rallying cry of organizations.  In a drive to reduce cost and speed up innovation we have started to treat hardware as a commodity and focus on software as the solution.  But there is a problem.  What if our hardware cannot keep up with our software?  Are we asking too much of our hardware?</p>
<p>Moore’s law states that processor speeds double every two years (or eighteen months according to Intel).  In technology two years is an eternity so engineers have devised ground breaking methods to speed up processors.   One such method, called speculative execution, allows a processor to perform a function before it knows whether the function is required.  If the function is not required then it is discarded but the act of completing it, just in case, allows the processor to perform operations more quickly.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>While designed as an optimization technique, Meltdown and Spectre proved that a cache timing attack <a href="https://youtu.be/q3WZiiaXHps">could take advantage of speculative execution</a> to expose secure kernel memory.  As described by <a href="https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/">The Register</a>, “To make the transition from user mode to kernel mode and back to user mode as fast and efficient as possible, the kernel is present in all processes&#8217; virtual memory address spaces, although it is invisible to these programs…It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.”</p>
<p><a href="https://youtu.be/q3WZiiaXHps">https://youtu.be/q3WZiiaXHps</a></p>
<p>Another example of the desire to use software to solve the limitations of hardware is the deployment of Virtual Machines (VMs).  VMs have truly changed the world, creating the cloud and allowing organizations to dramatically reduce cost.  VM technology allows collocated, software-based operating systems to share expensive hardware resources.  VM security is based on hardware Trusted Platform Module (TPM) storing secure information and software hypervisors scheduling access to hardware resources.</p>
<p>Despite these barriers, side channel attacks can still be used to cross the boundary between collocated VMs and steal private information.  These attacks involve an attacker VM alternating execution with a target VM to observe behavior of the underlying hardware.  They take advantage of the fact that, in order to conserve memory and speed up processing, VMs often share caches and libraries (i.e., memory page deduplication).  While difficult, multiple researchers have shown a side channel attack’s ability to retrieve secure information including <a href="https://eprint.iacr.org/2014/435.pdf">private keys</a>.  Other researchers have shown the ability to perform Denial of Service (DoS) attacks by using the VM <a href="http://www.ccs.neu.edu/home/pjd/papers/nca11-xen.pdf">scheduler</a> to monopolize hardware resources at the expense of collocated VMs.</p>
<p>With the advent of Software Defined Networking (SDN) will the next attack be listening to other people’s traffic on bare metal switches?</p>
<p>If we are asking too much of our hardware what can we do to correct it?  Should we accept slower processors, which has been the result of Intel’s patches?  Should we no longer allow collocation of VMs or demand completely separate data centers for our servers?</p>
<p>I am sure we will not start accepting slower speeds or higher costs so the next best option seems to be <a href="https://www.telegrid.com/10-commandments-embedded-software-security">education</a>.  Developers need to understand how hardware and software interoperates in order to prevent future cybersecurity attacks.  For instance, in addition to a six week course on Python, developers should also invest in a six week course on machine language.  Perhaps if they understood how hardware resources are actually used by software they will know when to push hardware and when not to.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/meltdown-and-spectre">Hardware’s Burden: Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does President Trump Want an Offline LINUX Repository?</title>
		<link>https://telegrid.com/offline-linux-repository?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=offline-linux-repository</link>
		
		<dc:creator><![CDATA[Beth Flippo]]></dc:creator>
		<pubDate>Mon, 15 May 2017 12:11:37 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[embedded security]]></category>
		<category><![CDATA[LINUX repository]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1096</guid>

					<description><![CDATA[<p>On May 11th President Trump signed a Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.  In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/offline-linux-repository">Does President Trump Want an Offline LINUX Repository?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On May 11<sup>th</sup> President Trump signed a <a href="https://www.whitehouse.gov/the-press-office/2017/05/11/presidential-executive-order-strengthening-cybersecurity-federal">Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure</a>.  In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the highest cybersecurity risks faced by executive departments and agencies.  Known vulnerabilities include using operating systems or hardware beyond the vendor&#8217;s support lifecycle, <strong>declining to implement a vendor&#8217;s security patch, or failing to execute security-specific configuration guidance</strong>.”  It seems the President agrees with something <a href="http://www.telegrid.com">TELEGRID</a> has been recommending for years, an offline LINUX repository for secure networks.</p>
<p>As an embedded software developer I can go on and on about the many benefits of LINUX.  I can easily list hundreds of benefits.  What I believe is the greatest though is the LINUX repository.</p>
<p>The LINUX repository is an online archive of open source and proprietary software packages that programmers use for development or maintenance.  There is a repository for every LINUX distribution with compiled packages for a multitude of hardware configurations.  Software developers can create upgrades or security patches and upload them to the LINUX repository where they can be easily downloaded by users.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Unfortunately, new security risks are forcing system administrators to limit connectivity between secure networks and the internet.   You can’t be hacked if a hacker can’t get in. While a closed network is ideal for security, it is a big problem for software maintenance.</p>
<p>Since the LINUX repository is online, the software upgrades are inaccessible on a secure network.  For years defense contractors, like <a href="http://www.telegrid.com">TELEGRID</a>, have had to go to great lengths to deploy software upgrades on secure networks.  This leads to delays in the deployment of security patches and seemingly endless upgrade cycles.</p>
<p>To resolve these issues we recommend replicating the LINUX repository inside secure networks with an offline LINUX repository.  But how do we update the LINUX repository if it is offline? One solution is to deploy a cross domain solution that straddles the secure and unsecure networks.  Another solution is compressing repository updates and sending them to a system administrator who can upload them into the offline LINUX repository.</p>
<p>While secure networks are important we must not forget that the main goal is functional, bug-free and secure code.  An offline LINUX repository will make it easier to maintain code on secure networks and apply needed security patches.  It seems the President agrees.</p>
<p>&nbsp;</p>
<p>Beth Flippo is Vice President of Embedded Software at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/offline-linux-repository">Does President Trump Want an Offline LINUX Repository?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Government Activism and IoT</title>
		<link>https://telegrid.com/government-activism-and-iot?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=government-activism-and-iot</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 16:23:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[embedded security]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=985</guid>

					<description><![CDATA[<p>The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet.  This event was &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-activism-and-iot">Government Activism and IoT</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet.  This event was especially felt in Washington, D.C. where there seems to be an uptick in the amount of Government activism and IoT and the frequency and scale of intervention with IoT device manufacturers.  The following are just a few examples:</p>
<ul>
<li>On December 30, 2016 the Congressional Internet of Things Working Group released a <a href="http://latta.house.gov/uploadedfiles/iot_working_group_white_paper.pdf">white paper</a> on IoT stating that, “Recent examples of cyberattacks on IoT devices have exposed not just the potential impact on individual consumers, but the possible vulnerability on the broader Internet infrastructure.”</li>
</ul>
<ul>
<li>On January 5, 2017 the Federal Trade Commission issued a <a href="https://www.ftc.gov/system/files/documents/cases/170105_d-link_complaint_and_exhibits.pdf">complaint</a> against D-Link claiming that D-Link’s “routers and cameras have been vulnerable to attacks that subject consumers’ sensitive personal information and local networks to a significant risk of unauthorized access.”</li>
</ul>
<ul>
<li>On January 9, 2017 the Federal Drug Administration released a <a href="http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm535843.htm">note</a> about St. Jude Medical stating that its devices had vulnerabilities that, “if exploited, could allow an unauthorized user, i.e., someone other than the patient&#8217;s physician, to remotely access a patient&#8217;s RF-enabled implanted cardiac device.”</li>
</ul>
<ul>
<li>On January 12, 2017 the Department of Commerce released a <a href="https://www.ntia.doc.gov/files/ntia/publications/iot_green_paper_01122017.pdf">Green Paper</a> highlighting the security concerns around IoT. It states that the DDoS attack, “was the most visible and far-reaching example of the potential risks that must be mitigated when considering IoT.”</li>
</ul>
<p>It appears that this the beginning of an activist approach taken by the Government to monitor IoT device manufacturers.  Indeed, the Congressional Internet of Things Working Group white paper states that participants, “grappled with whether or not a solution should rely on industry established standards, agency recommendations, legislation, or a combination of all the above.”</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>TELEGRID is a designer of <a href="http://telegrid.com/embedded-software-security/">secure embedded systems</a> for the US Military and has developed a <a href="http://telegrid.com/embedded-software-security/">framework</a> to design systems in line with DISA’s Security Technical Implementation Guides (DISA STIGs).  While some commercial manufacturers follow NIST guidelines others ignore security completely.  As Senator Mark Warner, co-founder of the Senate Cybersecurity Caucus <a href="http://www.warner.senate.gov/public/index.cfm/pressreleases?ContentRecord_id=CD1BBB25-83E0-494D-B7E1-1C350A7CFCCA">stated</a>, “Manufacturers today are flooding the market with cheap, insecure devices, with few market incentives to design the products with security in mind, or to provide ongoing support.”</p>
<p>Is the Government going to “incentivize” commercial manufacturers to bake in security?  Will the Government shut certain companies out of the market for selling unsecure IoT devices?  What will be the cost impact to consumers?</p>
<p>These are all very tough questions and it seems the Government is moving quickly to try to answer them.  Are IoT manufacturers paying attention?</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com/">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-activism-and-iot">Government Activism and IoT</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Moses the Project Management Professional</title>
		<link>https://telegrid.com/moses-the-project-management-professional?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=moses-the-project-management-professional</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 04 Feb 2016 19:08:44 +0000</pubDate>
				<category><![CDATA[Embedded Software]]></category>
		<guid isPermaLink="false">http://telegrid.com/embeddedsecurityframework/?p=341</guid>

					<description><![CDATA[<p>There is an interesting story in the Bible about Moses and his father-in-law Yitro.  Yitro visits Moses and sees him sitting in his tent day and night as thousands of people ask for his advice. &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/moses-the-project-management-professional">Moses the Project Management Professional</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="article-body" dir="ltr">
<p>There is an interesting story in the Bible about Moses and his father-in-law Yitro.  Yitro visits Moses and sees him sitting in his tent day and night as thousands of people ask for his advice. Yitro advises his son-in-law to set up a court system where he would delegate the easy problems to lower level judges and only judge the most difficult cases. Moses ends up taking Yitro’s advice and sets up a full court system.</p>
<p>I believe there are a many lessons in this story that apply to engineers. Firstly we see that since the dawn of time father-in-laws have been telling their son-in-laws what to do. Apparently this trait is in our DNA. Secondly we learn that Moses was the world’s first Project Management Professional (PMP). Yitro literally invented Project Management. Thirdly, we learn the value of delegating responsibility.</p>
<p>As engineers, how often do we try to solve a problem ourselves instead of asking for help? Like an engineer who never took a literature course believing that people want to read his blog…purely hypothetical.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>What has the lack of delegating meant for the cybersecurity of our embedded systems? Engineers designing a radio are focused on RF propagation and those developing a vehicle are focused on fuel efficiency &#8211; as they should be. However the new reality of the Internet of Things means that everything is connected and everything can become an attack vector. Many engineers are not equipped for this new reality. Instead of asking for help, they kick the can down the road to the platform certification stage where the redesign increases schedule delays and cost. For instance, in a recent study of weapons systems, the GAO estimated that system redesigns increased development time twofold and development cost threefold.</p>
<p>Some of our greatest leaders were expert delegators. It is important to understand the value of asking for help and to ask for it early. When TELEGRID is designing and developing a new product we will actively search out experts in every discipline. We probably do not need a mechanical designer of tanks to design a handset, but when a device needs to be MIL-STD-810G it is important to use the best. The same should be said of embedded software security.</p>
<p>Eric Sharret is the Vice President of Business Development for TELEGRID. <a href="http://telegrid.com/embeddedsecurityframework/embedded-security-framework/" target="_blank" rel="nofollow">TELEGRID</a> designs and develops secure embedded systems for the US Military.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/moses-the-project-management-professional">Moses the Project Management Professional</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cam Newton, Blizzards, and Cybersecurity</title>
		<link>https://telegrid.com/cam-newton-blizzards-and-cybersecurity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cam-newton-blizzards-and-cybersecurity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Mon, 25 Jan 2016 21:20:55 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<guid isPermaLink="false">http://telegrid.com/embeddedsecurityframework/?p=281</guid>

					<description><![CDATA[<p>What can Cam Newton teach us about embedded software cybersecurity?  His answer to a reporter's question following Carolina's win over the Arizona Cardinals tells us everything we need to know.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/cam-newton-blizzards-and-cybersecurity">Cam Newton, Blizzards, and Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As ticker tape rained down on Bank of America field the Carolina Panthers gathered to celebrate their NFC Championship win. At the center of the crowd stood Cam Newton, the quarterback and leader of the team. Surrounded by reporters Cam was asked about his preparation for the Super Bowl. Curiously Cam replied that he did not know who they would be playing but that he would be ready. He did not know who they would be playing in the Super Bowl?!? The Denver Broncos had won the AFC championship three hours earlier. In those three hours Cam did not bother to look at the scoreboard or ask a teammate who his next opponent would be?  Even with his team leading by over 30 points in the 4th quarter he didn&#8217;t stop to ask who is next?</p>
<p>My guess is that Cam was so focused on beating the Arizona Cardinals that he did not want to think about the Super Bowl. How often in sports do we see the dominant team lose because they “looked past” the current opponent? How often do they disregard the easier team only to suffer an upset? Maybe Cam Newton made a conscious decision not to look past Arizona and get distracted from the job of winning the NFC Championship. Perhaps he would have gotten overwhelmed if he thought about all of the games between him and a Super Bowl.  Maybe he knew that the only way for him to accomplish his goal was to take it “one game at a time.”</p>
<p>This lesson is obvious to all of us Northeasterners who just emerged from our igloos on Sunday after Winter Storm Jonas. Looking out at the multiple feet of snow we knew that the only way we were ever going to clear our driveways was to take it one shovel at a time (or one phone call to the plow guy – not judging). If we started worrying about the hours we were going to spend, or the potential chiropractor bills, we never would have survived.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>So what can Cam Newton teach us about embedded software cybersecurity? Just like winning the Super Bowl developing a secure embedded system is really hard (but not nearly as cool). If we stand back and look at the breadth of the problem we can easily get overwhelmed. But, if we break the problem down into pieces we will make it through. Start with a FIPS 140-2 validated encryption engine, then focus on PKI and then build your application on top. Take each step independently and make sure you develop it correctly before you move on to the next step.</p>
<p>This is the reason TELEGRID developed its <a href="http://telegrid.com/embedded-software-security/" rel="nofollow">Embedded Security Framework (ESF)</a>.  The ESF is a structured collection of encryption and authentication modules designed to accelerate the design and development of embedded systems. It is based on TELEGRID’s 30+ years of design, development and production of embedded systems in the field of voice and data encryption, secure unified communications and management of networked encryptors. The ESF helps Government Engineers design STIG compliant embedded systems quickly.</p>
<p>Eric Sharret is the Vice President of TELEGRID Technologies, Inc. <a href="http://www.telegrid.com" rel="nofollow">TELEGRID</a> designs and develops secure embedded systems for the US Military.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/cam-newton-blizzards-and-cybersecurity">Cam Newton, Blizzards, and Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>10 Commandments of Embedded Software Security</title>
		<link>https://telegrid.com/10-commandments?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-commandments</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 05 Nov 2015 19:20:34 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<guid isPermaLink="false">http://ysbsqa-advanced-a.com/wp331/?page_id=2</guid>

					<description><![CDATA[<p>TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security.  This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/10-commandments">10 Commandments of Embedded Software Security</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security.  This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed by any programmer creating embedded software and any program manager concerned about the security of their embedded software.  To read the white paper <a href="http://telegrid.com/10-commandments-embedded-software-security/">click here</a></p>
<p>The post <a rel="nofollow" href="https://telegrid.com/10-commandments">10 Commandments of Embedded Software Security</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defense Spending by State &#8211; Report Released</title>
		<link>https://telegrid.com/defense-spending-by-state-report-released?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=defense-spending-by-state-report-released</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 29 Sep 2015 14:10:30 +0000</pubDate>
				<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<guid isPermaLink="false">http://telegrid.com/embeddedsecurityframework/?p=60</guid>

					<description><![CDATA[<p>The Department of Defense released its report on defense spending by State for 2014.  See how your State and County performed.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/defense-spending-by-state-report-released">Defense Spending by State &#8211; Report Released</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="article-body" dir="ltr">
<p>The Department of Defense released its report on defense spending by State for 2014.  It is no shock that the draw down in Iraq and Afghanistan, as well as Sequestration, have resulted in a major reduction in defense spending.  The value in this report though lies in the incredibly detailed breakdown of defense spending by State and County.  This report is not only valuable to defense contractors, like <a href="http://www.telegrid.com" target="_blank">TELEGRID</a>, but also to ordinary citizens who want to see what this impact will have on their local economy and housing market.  Below are some highlights of the report:</p>
<p>From FY2011 to FY2019 real defense spending is expected to decline by 28%. From FY2013 to FY2021 defense spending will be reduced by $454bn</p>
<p>The 5 states with the largest defense spending as a percentage of GDP were Virginia, Hawaii, Alabama, District of Columbia and Alaska. The state with the lowest defense spending as a percentage of GDP was Oregon.</p>
<p>The 5 states with the largest defense spending (in dollar terms) were Virginia, California, Texas, Maryland, and Florida. The state with the lowest defense spending was Vermont. The 10 states with the highest DoD spending accounted for almost three-fifths of total DoD spending in the nation.</p>
<p>To see how your State and County performed <a href="http://www.defense.gov/News/News-Releases/News-Release-View/Article/620776/dod-releases-fiscal-year-2014-defense-spending-by-state-report" target="_blank">click here</a>.</p>
</div>
<p>The post <a rel="nofollow" href="https://telegrid.com/defense-spending-by-state-report-released">Defense Spending by State &#8211; Report Released</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Government vs. Commercial Cybersecurity</title>
		<link>https://telegrid.com/government-vs-commercial-cybersecurity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=government-vs-commercial-cybersecurity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 08 Sep 2015 10:13:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<guid isPermaLink="false">http://telegrid.com/embeddedsecurityframework/?p=62</guid>

					<description><![CDATA[<p>In the past two weeks TELEGRID engineers gave presentations on Embedded Software Security and attended talks on M2M cybersecurity, IPv6 security flaws, and personal cybersecurity best practices.  Since TELEGRID designs embedded software security tools for &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-vs-commercial-cybersecurity">Government vs. Commercial Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="article-body" dir="ltr">
<p>In the past two weeks TELEGRID engineers gave presentations on Embedded Software Security and attended talks on M2M cybersecurity, IPv6 security flaws, and personal cybersecurity best practices.  Since TELEGRID designs embedded software security tools for the US Military all of these talks were aimed at the Government.</p>
<p>As we sat and listened we began to notice a common theme.  According to the presenters, Commercial cybersecurity is head and shoulders above the Government and the only way the Government will defeat this enemy is to learn from the Commercial sector (and pay the consultant giving the talk).  We were therefore quite amused to read in this month&#8217;s issue of Harvard Business Review, the de facto bible of Industry, that HBR believes that the Government is in fact better than the Commercial sector at cybersecurity.</p>
<p>We think the simple takeaway is that cybersecurity is difficult and everyone feels like the other guy is doing it better.  We also think Government engineers should print out this article, hang it on their wall and show it to a consultant the next time they are told they should learn from the Commercial sector.</p>
<p>To read the Harvard Business Review article <a href="https://hbr.org/2015/09/cybersecuritys-human-factor-lessons-from-the-pentagon" target="_blank" rel="nofollow">Click Here</a>.</p>
</div>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-vs-commercial-cybersecurity">Government vs. Commercial Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
