Solid foundations + innovation = stout cybersecurity

Every security professional knows that the adversary has the advantage. We have to find every vulnerability and remediate it, and the enemy only needs to find one vulnerability and exploit it. This asymmetry underlies their economic advantage: finding one vulnerability…

Why security takes a backseat in IoT devices

The “Internet of Things,” or IOT: we’ve all heard the term, but what does it really mean? More importantly, how do we secure all of these … “things”? First, a stab at defining the term and its components. The term…

What Steps Can the Military Take to Secure Weapon Systems?

Today’s military platforms and weapon systems are increasingly network and software-enabled, which is helping to make them more effective and efficient tools for the warfighter, but is opening them up to a new avenue of attacks that less connected and…

Could Adversaries Hack Weapon Systems? It’s Certainly Possible…

Much of the same evolution that we’re seeing in our own vehicles – including the emergence of autonomous vehicles and smarter, more connected vehicles – is occurring, in parallel, in military vehicles and weapons platforms. There is barely a single…