Feb 24, 2021
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.
Feb 18, 2021
“You got ninety percent of the American public out there with little or no net worth. I create nothing. I own. We make the rules, pal. The news, war, peace, famine, upheaval, the price per paper clip. We pick that rabbit out of the hat while everybody sits out there wondering how the hell we did it. Now you're...
Feb 11, 2021
Securing embedded systems presents unique and complex challenges when it comes to organizing and assessing software assets during assurance activities. The closed source nature of the supply chain and volume of differing components has made this a onerous and costly activity
-- IIOT World
On this Very Special...
Feb 5, 2021
Together we stand, divided we fall
Come on now people,
let's get on the ball and work together
Come on, come on let's work together, now now people
Because together we will stand,
every boy every girl and a man
-- Let’s Work Together, Canned Heat
A truly rollicking episode of InSecurity finds Matt...
Feb 2, 2021
The diversity of the global supply chain that makes it critical to modern society also makes it very difficult to know where all of the components of a device came from. Who designed each part, who made it, who put it into a device, who sold it, and who bought it? Inside the sheet metal or plastic shells of our...