About this Series of Three Blog Posts In July 2020 the Atlantic Council, a highly-respected international affairs leadership institute based in Washington, DC, published a wide-ranging, evidence-based report titled “Breaking Trust: Shades of Crisis Across an Insecure...
This blog post introduces a new podcast series hosted by CEO Joe Saunders. Here is a message from him with the backstory. Backstory: The School of Hard Knocks When I was a freshman in college, I was shocked when I received a low mark on my very first midterm exam. Ok,...
The yocto project is a game-changing developer environment that streamlines the creation of custom embedded linux distributions for any hardware architecture. yocto uses “layers” and “recipes” to provide easy configuration management and a reliable and reproducible...
DoD weapon systems remain vulnerable to cyber attack. It’s not clear which ones will actually be able to perform when needed. The VxWorks/URGENT 11 vulnerabilities offer another example. VxWorks is a real-time operating system (RTOS) used in embedded systems. It is...
Securing a large complex enterprise network is a challenging, never-ending process. The move to cloud has intensified the problem. Often, there is nothing to protect an IT system when a breach makes it past perimeter defenses. Moreover, memory corruption bugs are...
Organizations often perceive cybersecurity as a necessary evil. They know that it’s critical to protect business assets but it’s seldom seen as a driver that helps move the business forward. It’s a checkbox, a requirement that is begrudgingly addressed to reduce risk...