https://bedrocksystems.com/wp-content/uploads/bedrock-webinar-distilling-critical-infrastructure.mp4 In “Dissecting Critical Infrastructure Risks: The Double-Edged Sword of Interoperability”, an expert panel of cyber security and critical infrastructure professionals discuss how the growing need for interoperability between the legacy and modern OT and IT systems that power our most critical infrastructure has resulted in unprecedented levels of architectural complexity which hinders the ability […]
In the last year and a half, business models have shifted significantly as remote work and cloud migration have changed the security landscape. Identity and access management are perhaps the most crucial components of producing the cybersecurity policies and practices required to provide authorized users with a secure way to access their data, applications and […]
Why Modern Cyber Security and Ransomware Threats Mean It’s Time to Move Beyond Least Privilege to Least Functionality
John Walsh, SVP Business Development and Strategy at BedRock Systems Inc. The SolarWinds cyberattack went undetected for over a year before it was publicized last winter, following in the footsteps of many preceding cyberattacks. Unfortunately, many cyber threats remain undetected for long periods of time – most go undetected for 45-100 days and required another […]
Alexander Damisch, Cofounder and VP Products at BedRock Systems In 2015, the driver of a Jeep Cherokee lost control of the vehicle in the middle of a highway. Ten miles away, two hackers had taken over, turning the air conditioning on, changing the radio station, engaging the windshield wipers and eventually cutting the transmission. Thankfully, […]
To effectively execute on the cybersecurity EO, organizations will have to shift their approach to security from passive to active.
Barely a week passes by without worrying news of an attack on the infrastructure we rely so heavily on. Who would have thought that the availability of the most essential foundations for life on this planet are at risk? While experts have warned for decades that we need to take action, the recent incident in […]
Legacy security has a weak foundation. BedRock Active Security is the fundamental security layer missing in traditional systems.
Traditionally, software design relies on inefficient, ineffective, informal techniques to ensure that the software operates as intended. Consequently, bugs slip through the quality assurance process and companies spend a great deal of time and money trying to fix them. Formal methods techniques provide an alternative (but complementary) means to ensure quality. Using these techniques, developers build mathematical models of the systems and use logic to reason precisely about them.
BedRock HyperVisor™ or BHV™ is built with leading edge materials: a formally verified trusted computing base with a precise specification, so confidential data is protected and applications behave exactly as specified.
New design ensures that company data is safe and applications perform as expected. By Osman Ismael Merriman-Webster defines trust as “one in which confidence is placed”. Nowadays, businesses have difficulty placing their trust in their computer systems because they constantly fall victim to attack. The problem is traditional hypervisor design is outdated. A hypervisor based […]