Syndicated Blog

Eclypsium | Supply Chain Security for the Modern Enterprise
Supply Chain Security for the Modern Enterprise

Market Forces vs. Regulation: How to Drive IT Product Safety

| | Live Webinars
Over the past 50 years, traveling in automobiles has become much safer. Part of this is due to government regulations and part due to market forces. Given the criticality of enterprise IT ...

Android Supply Chain Validation Cheat Sheet

| | Blog
Several different tools and techniques are available for Android to enumerate software and configurations, allowing you to begin to validate the software on devices. This cheat sheet is based on the work ...

7 Reasons Why Vendor Platform Security Is Not Enough

| | Solution Briefs
Securing IT assets demands continuous effort from both technology vendors and purchasing organizations. Vendors must deliver secure offerings with timely updates and defenses against known threats, and it’s up to end-users to ...
BTS #26 - What We Don’t Know Will Hurt Us - Cheryl Biswas

BTS #26 – What We Don’t Know Will Hurt Us – Cheryl Biswas

| | Podcasts
Cheryl is super passionate about supply chain security and visibility. Tune in to our discussion on how we can collectively get better at reducing the attack surface and working to fix the ...

Eclypsium Announces New Global Partnership Program

| | Press Release
Following record results in FY23, company prioritizes channel momentum Portland, OR – March 26, 2024 – Eclypsium, the digital supply chain security company protecting critical hardware, firmware, and software in enterprise IT ...

Linux Supply Chain Validation Cheat Sheet

| | Blog
Linux provides several tools and techniques that allow users to query systems for information about hardware and firmware (This post builds on our previous post Linux Commands To Check The State Of ...
Beware the Ides of March 2024: Analyzing CISA KEV Data to Understand Danger

Beware the Ides of March 2024: Analyzing CISA KEV Data to Understand Danger

| | Blog
In our continuing series on the CISA Known Exploited Vulnerabilities (KEV) catalog, we provide an update on the landscape of cyber threats as it has evolved since March 2023. The KEV list, ...
BTS #25 - Supply Chain Threats and Regulations

BTS #25 – Supply Chain Threats and Regulations

| | Podcasts
Paul and Allan will talk a little bit about Allan’s background and current work at Eclypsium. Next, we’ll cover some of the recent news and topics we’ve been discussing on our blog ...
A Faster Path to Memory Safety: CHERI, Memory Tagging, and Control Flow Integrity

A Faster Path to Memory Safety: CHERI, Memory Tagging, and Control Flow Integrity

| | Blog, research
Recently, the White House published a technical paper asking organizations to develop roadmaps for implementing memory safety in their software applications. The goal is to eliminate a broad class of software defects ...

Control the Network, Control the Universe

March 19, 2024Time: 1:00 pm ET | 10:00 am PT The ever-evolving landscape of network security faced new challenges in 2023 as hackers developed sophisticated methods to exploit vulnerabilities in network devices ...