Why Formal Methods?

Why Formal Methods?

In this post, we gave a high-level overview of why and how we use formal methods at BedRock. In future posts, we’ll dive deeper into these topics.

Four Takeaways from The DOE Cybersecurity and Technology Innovation Conference

DOE Cybersecurity

By John Walsh | SVP Business Development & Strategy I recently joined top thought leaders at the U.S. Department of Energy (DOE) Cybersecurity andTechnology Innovation conference to discuss the future of the integration of informationtechnology (IT) and operational technology (OT) within critical infrastructure, focusing on“Leveraging Innovation to Meet Future Challenges.” A year after the Colonial Pipeline attackdemonstrated the […]

Why Least Functionality Must be a Core Tenet of Zero Trust Architectures

least functionality

In the last year and a half, business models have shifted significantly as remote work and cloud migration have changed the security landscape. Identity and access management are perhaps the most crucial components of producing the cybersecurity policies and practices required to provide authorized users with a secure way to access their data, applications and […]

Time for Critical Industry to BedRock its Infrastructure

Critical Infrastructure

Barely a week passes by without worrying news of an attack on the infrastructure we rely so heavily on. Who would have thought that the availability of the most essential foundations for life on this planet are at risk? While experts have warned for decades that we need to take action, the recent incident in […]

Formal Methods Address the Deficiencies Of the Traditional Development Processes

Formal Methods

Traditionally, software design relies on inefficient, ineffective, informal techniques to ensure that the software operates as intended. Consequently, bugs slip through the quality assurance process and companies spend a great deal of time and money trying to fix them. Formal methods techniques provide an alternative (but complementary) means to ensure quality. Using these techniques, developers build mathematical models of the systems and use logic to reason precisely about them.

Not All Hypervisors are Created Equally

hypervisor

BedRock HyperVisor™ or BHV™ is built with leading edge materials: a formally verified trusted computing base with a precise specification, so confidential data is protected and applications behave exactly as specified.