Thoughts on (Amazonian) Leadership| www.daemonology.net
Blog| tratt.net
We’ve covered CHERI, and our involvement with the development of the ARM Morello yocto layer before, so for those who aren’t aware of what it is we recommend looking back through our previous blog posts on Introducing ARM Morello and CHERI, and Linux Yocto layer for the ARM Morello board, CHERI (Capability Hardware Enhanced RISC …| www.thegoodpenguin.co.uk
Bjarne Stroustrup says standards committee needs to show it can respond to memory safety push| www.theregister.com
One of life’s great pleasures is trust: having confidence in another person| tratt.net
Protecting devices from malicious use is often a cat-and-mouse game between security researchers identifying software vulnerabilities (CVEs) and product-makers patching them before attackers can exploit them. As a result, devices can no longer be developed, shipped and forgotten. Instead, manufacturers must commit to keeping those devices up to date and free from critical vulnerabilities for …| www.thegoodpenguin.co.uk
My re:Invent asks| www.daemonology.net
Imagine a world where common programming errors like buffer overflows are a thing of the past. As cybersecurity threats evolve, ensuring memory safety in programming is more crucial than ever. Memory safety vulnerabilities have been a persistent challenge since the early days of network computing, exemplified by the infamous Morris worm attack over three decades| FreeBSD Foundation
Borrow checking, RC, GC, and the Eleven (!) Other Memory Safety Approaches| verdagon.dev
The USA ONCD (Office of the National Cyber Director) is joining the chorus of people demanding that developers […]| DEVCLASS
Cybersecurity Technical Advisor Bob Lord stresses the importance of memory safety in making software safer by design.| Cybersecurity and Infrastructure Security Agency CISA
Manually manage memory through raw pointers.| doc.rust-lang.org
Previous chapter: DEFEND AGAINST PHYSICAL THREATS | Multipolar Active Shields| foresightinstitute.substack.com