ISAs and the Dawning Hardware Security Revolution

The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication.
Security teams implement firewall software, antivirus protection, data encryption, multifactor authentication, access controls, intrusion detection and mitigation tools, and data backup systems to better neutralize and recover from ransomware lockdowns.
Those limited parameters miss a fast-arriving hardware security revolution.
Emerging technologies in the hardware security space - namely, advanced instruction set architecture extensions - are positioned to make game-changing contributions to the IT security repertoire.
Security safeguards imposed at the hardware level, the foundation upon which all malware and software-based security operates, have the unique power to pull the rug out from under attack strategies, denying nefarious applications access to exploits or even the ability to run in the first place.
ISAs Are Fundamental to IT Security Before discussing specific new developments in hardware-based security, here's a brief history lesson.
While less discussed, security protections on the hardware side of the ledger are commonplace and have long been foundational to IT security.
Security experts are certainly familiar with hardware-based encryption methods that prevent unauthorized access to hard drives and network data.
Trusted Platform Module is a well-established hardware security standard that safeguards against tampering and compromise at bootup, as is Secure Boot.
These security measures may currently protect the hardware you're using.
The x86 ISA is a powerful ally for security teams securing Intel-based machines.
Arm, offering the most-used family of ISAs globally, has provided ISA security features in their low-overhead processors that have made it the leader in ISAs protecting phones, tablets, and other mobile devices.
The ISA Future Is Promising Emerging new ISA extensions leveraging open source technologies show exciting potential to revolutionize IT security practices and enable game-changing security strategies for developer teams.
One example is Capability Hardware Enhanced RISC Instructions, a hardware-based security research project developing ISAs that include CHERI Arm and CHERI RISC-V. Led by the University of Cambridge and SRI International, CHERI-enhanced ISAs take the unique approach of controlling memory access via hardware-enforced bounds and permissions while retaining compatibility with existing software.
The project also offers CheriBSD, which adapts the open source operating system FreeBSD to support CHERI ISA security features, including software compartmentalization and memory safeguards.
The high-performance compartmentalization provided by emerging ISAs also grants security teams a powerful tool for securing access to sensitive data and protecting it from attackers.
Open Source Drives IT Security Forward The increasing complexity and sophistication of modern attack techniques all but demands a revolution in IT security capabilities.
Emerging technologies offer that opportunity in the form of new security strategies that wield comprehensive, balanced software and hardware protections.
The collaborative power of open source is an essential engine behind this revolution, accelerating progress on projects through contributions from across the IT and security community.
Going forward, organizations that reinforce their security postures with a thoughtful assembly of advanced ISA hardware-based security and compatible software-based security tools will achieve the best outcomes.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 21 Dec 2023 01:20:20 +0000


Cyber News related to ISAs and the Dawning Hardware Security Revolution

ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
6 months ago Darkreading.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
6 months ago Darkreading.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
6 months ago Microsoft.com
Are Security Appliances fit for Purpose in a Decentralized Workplace? - Security appliances have been traditionally considered one of the most effective forms of perimeter security. Today, security appliances feature amongst the most riskiest enterprise devices and are a preferred method for threat actors to infiltrate a ...
6 months ago Securityweek.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 month ago Blog.checkpoint.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
4 months ago Cybersecuritynews.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 month ago Esecurityplanet.com
Apple iOS 16.3 Arrives with Support for Hardware Security Keys - Apple recently released the latest version of its iOS for digital devices, iOS 16.3, with support for hardware security keys. This update will help iOS users secure their login credentials by providing two-factor authentication. This means users are ...
1 year ago Bleepingcomputer.com
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
6 months ago Esecurityplanet.com
How secure is the "Password Protection" on your files and drives? - People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. Protecting files with passwords without encrypting ...
1 month ago Helpnetsecurity.com
IaaS Security: Top 8 Issues & Prevention Best Practices - Understanding the risks, advantages, and best practices connected with IaaS security is becoming increasingly important as enterprises shift their infrastructure to the cloud. By exploring the top eight issues and preventative measures, as well as ...
6 months ago Esecurityplanet.com
New Stellar Cyber Alliance to Deliver Email Security for SecOps Teams - Stellar Cyber, a Double Platinum 'ASTORS' Award Champion in the 2023 Homeland Security Awards Program, and the innovator of Open XDR has entered inao a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this ...
4 months ago Americansecuritytoday.com
A Practitioner's Guide to Security-First Design - Instead, organizations must proactively fortify their defenses and enter the era of security-first design - an avant-garde approach that transcends traditional security measures. Security-first design is an approach that emphasizes integrating robust ...
6 months ago Feeds.dzone.com
Konica Minolta Wins Two Platinum 'ASTORS' Homeland Security Awards - ' Now in its ninth year, it continues to recognize industry leaders in physical and border security, cybersecurity, emergency preparedness management and response, law enforcement, first responders, and federal, state, and municipal government ...
3 months ago Americansecuritytoday.com
McCaffrey Joins 'ASTORS' Champion SIMS Software Board of Advisors - SIMS Software, the leading provider of security information management software to the government and defense industries - and the 2023 Platinum 'ASTORS' Award Champion for Best Security Workforce Management Solution, is delighted to announce that ...
5 months ago Americansecuritytoday.com
Gaining Insights on the Top Security Conferences - A Guide for CSOs - Are you a CSO looking for the best security events around the world? Well, you have come to the right place! This article is a guide to the top security conferences that offer essential security insights to help make informed decisions. Security ...
1 year ago Csoonline.com
Understanding the 2024 Cloud Security Landscape - As we swiftly move towards the second quarter of 2024, predictions by cloud security reports highlight the challenges of cloud adoption in the cloud security landscape. This growing reliance on cloud infrastructure raises the critical issue of ...
3 months ago Feeds.dzone.com
The Art of Securing Cloud-Native Mobile Applications - We will explore the dynamic intersection of cloud-native architecture and mobile application security, delving into the strategies and best practices essential for safeguarding sensitive data, ensuring user privacy, and fortifying against emerging ...
6 months ago Feeds.dzone.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
4 months ago Techtarget.com
The Imperative for Zero Trust in a Cloud-Native Environment - The security policy is dynamically updated with the changes of users, devices, data and external risks. Due to the dynamic, containerized and microservice characteristics of cloud-native environments, traditional boundary security protection policies ...
6 months ago Securityboulevard.com
Entro Security Newest Competitor in 2024 'ASTORS' Awards Program - Secrets management and monitoring are crucial components of any security program. Entro is a holistic secret security platform designed specifically for security teams and CISOs. To ensure that doesn't happen, Entro offers an exclusive secrets ...
6 months ago Americansecuritytoday.com
DHS Awards UAA to Launch New ADAC-ARCTIC Center of Excellence - S&T will provide ADAC-ARCTIC $46 million over a 10-year cooperative agreement to establish this Research Center portfolio for Homeland Security in the Arctic. Vital insights from academic-led innovative research will help the Department of Homeland ...
5 months ago Americansecuritytoday.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)