Dissecting Critical Infrastructure Risks: The Double-Edged Sword Of Interoperability

Critical Infrastructure Risks

https://bedrocksystems.com/wp-content/uploads/bedrock-webinar-distilling-critical-infrastructure.mp4 In “Dissecting Critical Infrastructure Risks: The Double-Edged Sword of Interoperability”, an expert panel of cyber security and critical infrastructure professionals discuss how the growing need for interoperability between the legacy and modern OT and IT systems that power our most critical infrastructure has resulted in unprecedented levels of architectural complexity which hinders the ability […]

How Do You Win A Game of Chess Against A Grand Master?

IoT Smart Infrastructure

On March 17th BedRock SVP of Business Development and Strategy, John Walsh sat down with Dots and Bridges CEO and Founder, Pete Tseronis for IoT Smart Infrastructure Working Group to discuss protecting our Nation’s most critical infrastructure sectors. How do you win a game of chess? Through joint collaboration between Government and Industry, we can enable threat visibility, […]

BedRock Systems Appoints Josh Dobies to Lead Product Management and Marketing

Product Management

SAN MATEO, CA., January 12, 2022 — BedRock Systems, the leading software company delivering an unbreakable foundation for secured computing from edge to cloud, today announced the hiring of Josh Dobies as VP of Products.  An accomplished product leader, evangelist, and go-to-market executive, Dobies will drive product definition and go-to-market strategy for BedRock Systems. “Josh […]

How To Enhance Zero Trust – ZT

Zero Trust security model

Zero Trust – ZT relies on mutual authentication, verifying the identity and integrity of devices whether they exist inside or outside the network, and providing access to applications and services based on the confidence of device identity and device health in combination with user authentication and authorization. This provides a secure foundation for trusted communications […]

Why Least Functionality Must be a Core Tenet of Zero Trust Architectures

least functionality

In the last year and a half, business models have shifted significantly as remote work and cloud migration have changed the security landscape. Identity and access management are perhaps the most crucial components of producing the cybersecurity policies and practices required to provide authorized users with a secure way to access their data, applications and […]

BedRock Systems Adds Cybersecurity Expertise and Management Experience to Team

Cybersecurity Expertise

John Walsh and Efi Gatmor join BedRock Systems in key management roles with Cybersecurity Expertise and Management Experience SAN MATEO, Calif.–(BUSINESS WIRE)–BedRock Systems, the leading software company delivering an unbreakable foundation for secured computing from edge to cloud, continues to expand its technical and business-side capabilities with recent new hires at the leadership level. John Walsh […]