The world today has entered into a new era where consumers and enterprise alike have come to expect cyber attacks. However, as attacks become more severe with greater reach, a power shift is occurring among consumers who are losing trust in the enterprise and government to protect their privacy and data. Now, consumers are choosing […]
Blog
How to Address Cybersecurity Unforced Errors in 2019
Looking back on the progress that the cybersecurity industry made in 2018, I remain optimistic that advancements will continue over the next year ahead. But there were some big misses that the industry made where we all share some accountability. From my perspective, there were some unforced errors in 2018 that have continued to plague […]
Cog Joins GSA IoT Security Working Group
Addressing today’s IoT security challenge takes more than technology solutions. It requires experience, industry knowledge and expertise, collaboration and creativity. Most importantly, it takes a group of leaders that share a common goal. Today, we are honored to announce that Cog has become a member of the Global Semiconductor Alliance (GSA) and the GSA IoT […]
Listen, We Need to Talk About your Attack Surface
As Miguel de Cervantes wisely said, “Never put all your eggs in one basket.” Yet, when we design our software for IoT in one large, cumbersome, monolithic stack – well, that is exactly what we are doing. And it all comes down to the attack surface. For a software platform, the attack surface describes all […]
Microkernels Really Do Improve Security
We are thrilled to re-post this microkerneldude blog post –Random rants and pontifications by Gernot Heiser Many of us operating systems researchers, going back at least to the US DoD’s famous 1983 Orange Book, have been saying that a secure/safe system needs to keep its trusted computing base (TCB) as small as possible. For system of significant complexity, […]