Recent Blog Posts

ROP

Intel is innovating to stop cyber attacks

Intel, in partnership with Microsoft, has published a technology preview, showing how innovation in silicon architecture can help protect against advanced code-reuse attack techniques.  This is an example of how brilliant minds across the industry can think long-term, to make … Read more >

Intel release new technology specifications to protect against ROP attacks

Intel has a long history of working with the software community and making strides in strengthening protections of operating systems and software running on modern computer systems. As these protections came into effect, adversaries started looking for creative alternatives to bypass … Read more >

IoT testing with Simics, robot arm, and cloud

How Wind River uses Simics to test massive IoT networks – and more!

Just like Intel, Wind River has a large internal user base for Wind River Simics*. Simics is a very useful tool for embedded system developers and testers, and Wind River recently published a case study describing some of the internal … Read more >

UBB_019_Gamer1_Bkg_rgb.cut

Finding a kernel 1-2-3 bug by running Wind River Simics on Simics

I must admit that I love stories about bugs, strange and unexpected software behaviors, and debugging. They provide comic relief and drama in the supposedly dry world of software development. .  While other bugs turn out to be as elusive … Read more >

Vault2

What cybersecurity data should you trust?

The limitations of security data We are constantly being bombarded by cybersecurity data, reports, and marketing collateral—and not all of this information should be treated equally. Security data inherently has limitations and biases, which result in varying value and relevance … Read more >

Your appliances may be out to get you

Sometimes I think my appliances are conspiring against me. You know, when the dishwasher stops cleaning dishes on the same morning as the garbage disposal clogs up and the coffeemaker overflows. It’s like they have a secret planning session to overthrow … Read more >

Security Balance

Can zealous security cause harm?

Too much or too little of each can be unhealthy and lead to unintended consequences.  We are entering an era where the risks of connected technology can exceed the inconveniences of interrupted online services or the release of sensitive data.  … Read more >

Cloud-Adoption-Security2

Will your cloud be at risk?

  The Cloud is both compelling and alluring, offering benefits that entice many organizations into rapid adoption. The attractiveness of lower operational costs, powering new service offerings, and adaptability to cater to varying demands makes it almost irresistible to rush … Read more >