• Linux and Open Source

    Linux and Open Source

    Which are the most insecure languages?
    Published. March 25, 2019

    WhiteSource review of programming language security errors reveal, which languages have the most security holes. The "winner?" C. But that's only the start of the story....

  • Security Intelligence

    Security Intelligence

    Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019
    Published. March 25, 2019

    Organizations adopting NIST 800-53 should understand how upcoming changes will affect senior leadership accountability, data privacy and third-party assessments. The post Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 appeared first on Security Intelligence....

  • Darktrace


    Thwarting an invisible threat: How AI sniffs out the Ursnif trojan
    Published. March 21, 2019

    The cyber AI approach successfully detected the Ursnif infections even though the new variant of this malware was unknown to security vendors at the time....

  • All About Microsoft

    All About Microsoft

    Some Windows 7, 8.1 users reporting Security Essentials and Windows Defender problems
    Published. March 19, 2019

    Some Windows 7 and 8.1 users are noticing that their automatic anti-malware protection has been turned off and are seeing out-of-date virus definitions. A definition update fix is available now....

  • MS Security

    MS Security

    Reducing security alert fatigue using machine learning in Azure Sentinel
    Published. March 19, 2019

    Last week we launched Azure Sentinel, a cloud native SIEM tool. Machine learning (ML) in Azure Sentinel is built-in right from the beginning. We have thoughtfully designed the system with ML innovations aimed to make security analysts, security data scientists, and engineers productive....

  • Krebs on Security

    Krebs on Security

    Why Phone Numbers Stink As Identity Proof
    Published. March 17, 2019

    Phone numbers stink for security and authentication. They stink because most of us have so much invested in these digits that they've become de facto identities. At the same time, when you lose control over a phone number -- maybe it's hijacked by fraudsters, you got separated or divorced, or you were way late on your phone bill payments -- whoever inherits that number can then be you in a lot of places online....

  • TI E2E Community

    TI E2E Community

    Blog Post: Use validated security with FIPS 140-2 on SimpleLink™ Wi-Fi® devices
    Published. March 13, 2019

    As more and more devices connect to the Internet of Things (IoT), higher security standards have become a necessity. The threat from using unsecure IoT devices poses a risk to infrastructures as big as connected cities all the way down to connected fish tanks . Governments are taking notice that IoT devices need to be secure before integrating these devices into their infrastructures. In 2017, the U.S. Senate introduced legislation requiring that devices that connect to the internet have no security...

  • The Linux Foundation

    The Linux Foundation

    The Linux Foundation Launches New CommunityBridge Platform to Help Sustain Open Source Communities
    Published. March 12, 2019

    New platform serves open source developers and ecosystems by advancing Fundraising, Security, Mentoring and Diversity San Francisco, CA – March... The post The Linux Foundation Launches New CommunityBridge Platform to Help Sustain Open Source Communities appeared first on The Linux Foundation....

  • SecureRF's IoT Security Blog

    SecureRF's IoT Security Blog

    IoT Security Update: March 2019
    Published. March 7, 2019

    While some national governments have been alleged to take advantage of weaknesses in IoT security to engage in espionage, in anticipation of hosting the 2020 Olympics, Japan is proactively hacking into its citizens’ IoT devices to search for vulnerabilities and guard against potential attacks. Read our roundup of the latest news about IoT security below.… The post IoT Security Update: March 2019 appeared first on SecureRF....

  • Industrial Security

    Industrial Security

    Cyber Security Experts At Your Service: A Conversation with Tripwire’s Gary DiFazio
    Published. March 6, 2019

    To help provide a flavor of the insights and experience that Tripwire makes available, we’re conducting one-on-one interviews with several Tripwire in-house experts. You may have seen some of their bylines in Belden’s industrial blog over the past couple of years, but in this new series we want to provide a more direct glimpse into each expert’s individual industry purview. Each of them will discuss their own personal views on the current state of cyber security in the industrial environment....

  • IEEE Tech Talk Blog

    IEEE Tech Talk Blog

    Ransomware Is So 2017: Modern Cybercriminals Are All About Cryptojacking
    Published. March 6, 2019

    IBM's latest report on global cybersecurity trends shows that attackers are obeying the old maxim of following the money...

  • Security – Beningo Embedded Group

    7 Tips for Getting Started with TrustZone for MCU’s
    Published. November 8, 2018

    The new Armv8-M architecture from arm® with its Cortex®-M23 and Cortex®-M33 processors is quickly gaining steam in the industry. The Armv8-M architecture includes a new security extension known as TrustZone that will revolutionize and forever change the way that embedded software developers create microcontroller-based systems. Below are my top seven tips to help you get … Continue reading 7 Tips for Getting Started with TrustZone for MCU’s...

  • Embedded Basics

    Embedded Basics

    Embedded Basics – The Arm Security Manifesto
    Published. October 27, 2017

    Last week I attended Arm TechCon and a major theme through-out was embedded security. During the conference, Arm released their Security Manifesto which provides developers with Arm’s vision for how the IoT will be protected. Let’s briefly discuss a few highlights. First, I found the Arm Security Manifesto to be an interesting read. The document … Continue reading Embedded Basics – The Arm Security Manifesto...

  • Cloakable


    Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!
    Published. January 29, 2019

    Internet of Medical Things (IoMT) devices are already revolutionizing the healthcare business.  They are delivering on their promises of improved data access, convenience, operational efficiencies and automation for the Health Care Providers (HCP). Additional drivers […]...

  • Cyber Defense

    Cyber Defense

    "Writing Tips for IT Professionals"
    Published. January 25, 2019

        This cheat sheet offers guidelines for IT professionals seeking to improve technical writing skills.To print it, use the one-page PDF version; you can also customize the Word version of the document. Lenny Zeltser, the creatorof this cheat sheet,is the author of SEC402:The Secrets to Successful Cybersecurity Writing: Hack the Reader. Click the link … Continue reading Writing Tips for IT Professionals...

  • Taking Measure

    Taking Measure

    Identify, Protect, Detect, Respond and Recover: The NIST Cybersecurity Framework
    Published. October 23, 2018

    The NIST Cybersecurity Framework consists of standards, guidelines and best practices to manage cybersecurity-related risk. The Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. We spoke with Amy Mahn, an international policy specialist in the NIST Applied Cybersecurity Division, about the Framework, who can use it and how it's evolving.   What...

  • Mocana IoT Security Blog

    Mocana IoT Security Blog

    Mocana Enables the Highest Level of IoT Device Authentication Assurance with TPM 2.0 Support
    Published. July 25, 2018

    As the pace of cyber attacks on Internet of Things (IoT) and industrial systems continues to rise, there is a critical need for stronger security on IoT and industrial devices. For the past 15 years, Trusted Platform Module (TPM) technology has been used broadly by major chip vendors such as Intel, AMD, Infineon and others to prove the identity of a computer or financial transaction device....

  • From Silicon to Software

    From Silicon to Software

    Creating IoT Security from Silicon To Software
    Published. September 11, 2018

    Attackers often take advantage of the complexity that comes with balancing greater end-user convenience with traditional security. Behind that cool and responsive interface of an IoT device is millions of lines of code and superfast processing. The weakest link is something basic — a faulty implementation of a protocol, or a lack of a trusted […]...

  • Victor Chertakovsky

    Victor Chertakovsky

    How to Charge Lithium Iron Phosphate Rechargeable Batteries
    Published. September 2, 2018

    Lithium Iron Phosphate batteries are safer than Lithium-ion cells and are available in a range of huge cell sizes between 5 and 100 AH with much longer cycle life than conventional batteries...

  • Electronics Engineering Video Blog

    Electronics Engineering Video Blog

    EEVblog #1110 – Mailbag
    Published. August 9, 2018

    More than an hour of Mailbag! Forum HERE SPOILERS: Sony DVO-1000MD medical device video DVD recorder teardown 8:09 Security ISA card teardown from the 1980’s 18:39 Power Grid the board game! 25:02 USB soldering iron 27:21 TI-nSpire CAS+ calculator PROTOTYPE! 35:28 DIY JBC/Hakko soldering iron controller 41:49 UV LED lamp for PCB exposure 45:10 DIY ......

  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog

    Elliptic Curve Cryptography
    Published. November 16, 2015

    Secure online communications require encryption.  One standard is AES (Advanced Encryption Standard) from NIST.  But for this to work, both sides need the same key for encryption and decryption.  This is called Private Key encryption.  Public Key encryption is used to create a private key between two sides that have not previously communicated.  Compared to the history......

  • Industrial Control Systems Security

    Industrial Control Systems Security

    "Preparing for Cyber Security Incidents"
    Published. September 26, 2017

    This blog post was written by ICS515 instructor,Kai Thomsen. Talk with any incident responder and you'll learn that there are a few less glamorous parts of the job. Writing the final report and preparation in advance to an incident are probably top contenders. In this article I want to focus on preparation and explain to … Continue reading Preparing for Cyber Security Incidents...

  • Tech Design Forums Blog

    Tech Design Forums Blog

    Holistic verification change needed for self-driving cars
    Published. June 19, 2018

    Verification of the coming generation of highly autonomous vehicles needs says Peter Davies, director of security concepts at Thales....

  • Verification Horizons Blog

    Verification Horizons Blog

    Accellera Proposes a New Working Group
    Published. April 6, 2018

    Accellera to explore the need for an IP Security Assurance Standard In the era of SoC design where major design intellectual property (IP) blocks come from multiple sources and are combined to create an SoC or major block to be incorporated into yet another SoC, how can one test such systems to ensure they are […]...

  • Gabe On EDA

    Gabe On EDA

    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


    Disk, SSD, NVMe preparation tools cleaned up and on GitHub
    Published. September 14, 2017

    These are a collection of (MIT licensed) tools I’ve been working on for years to automate some of the major functionality one needs when setting up/using new machines with lots of disks/SSD/NVMe. The repo is here: . I will be adding some sas secure erase and formatting tools into this. These tools wrap other […]...

  • Functional Verification Blog

    Functional Verification Blog

    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...

  • Electrical Engineers  Talk Tech

    Electrical Engineers Talk Tech

    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...

  • Rands In Repose

    Rands In Repose

    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...

  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection

    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....

  • Laptops and Desktops Blog

    Laptops and Desktops Blog

    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....

Share and Enjoy:
  • Digg
  • Sphinn
  • Facebook
  • Mixx
  • Google
Extension Media websites place cookies on your device to give you the best user experience. By using our websites, you agree to placement of these cookies and to our Privacy Policy. Please click here to accept.