Navy Beefing Up At-Sea Enterprise Network

National Defense Magazine

From the article: The CAVES program employs automated reasoning to identify central problems in cryptographic designs early in the design phase, he said. “If you’re exploring a wide variety of possible algorithms … you will quickly rule out the ones that might have security issues,” he added. “You get the benefits of higher security and […]


Achieving memory safety without compromise

“As embedded software developers, the tools we rely on must provide us with low-level control of the functionality and performance of the systems we build. There must be an ability to manipulate hardware registers to write device drivers, and we must be certain that no runtime system will interrupt our tasks and lead to missed […]


Education Bill Drops


“This legislation marks a sea change in the continuing conflict between personal privacy and public good,” said David Archer, principal research scientist at Galois, a computer science firm. “The technology mandated here assures two things: that public policies affecting real people can be decided based on factual data about them, and that the privacy of […]


End-to-end data encryption: why HTTPS is not enough

SC Magazine

As secure HTTPS becomes more pervasive, it is worth asking: why should you end-to-end encrypt data when HTTPS is pretty secure? The answer is that HTTPS is an important but small piece of the crypto puzzle. Organizations determining what additional security requirements are needed should start the process by answering a few key questions


Software brittleness may harden embedded systems

Government Computer News

Legacy systems in the government are hard to secure against cyberattack, and that goes double for the embedded, real-time systems at the heart of the many control systems in advanced weapons, power plants and mission-critical infrastructure. Galois, a Portland, Ore.,-based secure software developer, has linked up with the Office of Naval Research under a three-year, […]


With government cyber defense, sometimes it’s best to give up hope

Federal News Radio

What is the single best thing that military and civilian government agencies can do in their search for an all-in-one cybersecurity solution? Simple: Give up hope. As counterintuitive as that may sound, there is no magic bullet that will solve all our cybersecurity challenges. A sufficiently-motivated and capable adversary will get around our defenses, given […]