On Friday, July 17, 2020, experts offered testimony on “Exploring the Feasibility and Security of Technology to Conduct Remote Voting in the House.” In addition to former Speaker Newt Gingrich, Jon Green, Honorable Cheryl L. Johnson, Dr. Ronald Rivest, and Dr. David...
The yocto project is a game-changing developer environment that streamlines the creation of custom embedded linux distributions for any hardware architecture. yocto uses “layers” and “recipes” to provide easy configuration management and a reliable and reproducible...
Lockheed Martin Ventures and NextGen Venture Partners Invest in RunSafe Security RunSafe’s patented process immunizes software across build and deploy toolchains MCLEAN, VA. – March 5, 2020 – RunSafe Security, the pioneer of a patented process to immunize software...
DoD weapon systems remain vulnerable to cyber attack. It’s not clear which ones will actually be able to perform when needed. The VxWorks/URGENT 11 vulnerabilities offer another example. VxWorks is a real-time operating system (RTOS) used in embedded systems. It is...
Note: This article was originally written exclusively for Supply Chain Digital. Stop me if you have heard this before: as companies increasingly rely on third-party software applications, many are losing control over their software supply chain. As globalization...
Organizations often perceive cybersecurity as a necessary evil. They know that it’s critical to protect business assets but it’s seldom seen as a driver that helps move the business forward. It’s a checkbox, a requirement that is begrudgingly addressed to reduce risk...