We are thrilled to re-post this microkerneldude blog post –Random rants and pontifications by Gernot Heiser Many of us operating systems researchers, going back at least to the US DoD’s famous 1983 Orange Book, have been saying that a secure/safe system needs to keep its trusted computing base (TCB) as small as possible. For system of significant complexity, […]
Free flight to Chicago for best innovative IoT use of D4 Secure on a Raspberry Pi. Open to everyone, you don’t need to be a hacker to use D4. Any Linux system builder should be able to create something cool with great security built in. Interested? Read below for details…
Cog’s D4 Secure products mitigate and protect connected devices from many different forms of attacks. Let’s take a look at how D4 is impacted by Meltdown and Spectre, and how device makers can use D4 to create more secure and feature rich IoT devices.
To say ET Exchange was informative, highly educational and galvanizing would be an understatement. Several of us from the Cog team attended the event a couple weeks ago and were impressed with the caliber of networking, presenters and content. Since Cog Systems specializes in cybersecurity, we found it inspiring that security was consistently part of […]
Often I am asked about what makes Cog Systems different, and how that will matter in the long term. By this point, this is an easy question for me – and the answer is as elegant as it is obvious. So, first, I suggest we all take a quick quiz. What is the single piece […]