On May 11th President Trump signed a Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the highest cybersecurity risks faced by executive departments and agencies. Known vulnerabilities include using operating systems or hardware beyond the vendor’s
Category Archives: Programming
What can Cam Newton teach us about embedded software cybersecurity? His answer to a reporter’s question following Carolina’s win over the Arizona Cardinals tells us everything we need to know.
TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security. This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed by any programmer creating embedded software and any program manager concerned about the security of their embedded software. To read
The Department of Defense released its report on defense spending by State for 2014. See how your State and County performed.
In the past two weeks TELEGRID engineers gave presentations on Embedded Software Security and attended talks on M2M cybersecurity, IPv6 security flaws, and personal cybersecurity best practices. Since TELEGRID designs embedded software security tools for the US Military all of these talks were aimed at the Government. As we sat and listened we began to