Resource Center

White Papers

An Analytical Framework to Measure the Effectiveness of Cybersecurity Defense Systems

Learn how measure the effectiveness of the different mitigating defenses available to address those threats.

Download
Securing AI & ML

How to protect AI & ML systems against control-oriented and data-oriented attacks

Download
The Cybersecurity Stack

Understand how to secure embedded systems with a defense-in-depth approach

Download
Safety In Our Embedded Systems

Learn how CoreGuard® ensures the safety of embedded devices

Download
Protecting Today’s Processors

Read an academic explanation of CoreGuard®

Download
Delivering Industrial IoT Trust

Security, safety, and privacy in the Industrial Internet of Things

Download

Overviews

CoreGuard Cybersecurity Scorecard

See how CoreGuard can prevent the exploitation of 94% of known software vulnerabilities

Download
CoreGuard Brochure

Overview of CoreGuard and how it integrates with a SoC

Download

Videos

Meet CoreGuard

Watch an introductory video to CoreGuard

Play
How It Works

See how CoreGuard protects a SoC

Play
CoreGuard Defends Against a Stack Smashing Attack

Watch CoreGuard stop buffer overflow attacks and protect systems from memory violations

Play

Webinars

Securing Embedded Systems

Co-hosted with Tortuga Logic, watch to learn more about MITRE’s CWE database and how to defend against the most dangerous CWE threats.

Download
Lessons Learned from SolarWinds

Co-hosted with Cadence Design Systems, watch to learn how to limit the scope and damage of software supply chain attacks.

Download
Securing AI & ML with RISC-V

Co-hosted with Andes Technology, watch to learn how to secure an AI system with RISC-V available security solutions.

Download
Real-time Cyberattack Detection, Prevention & Response

Learn the pros and cons of today’s detection tools. See why 5G needs a next-level solution

Download
How to Measure the Effectiveness of Your Cybersecurity Defenses

See how a new analytical framework can  measure the effectiveness of difference cybersecurity defenses

Download
The Cybersecurity Stack: How to Secure Industry 4.0

Learn about the Cybersecurity Stack and how it should be used to secure IIoT embedded systems.

Download

Cyberattack Examples

German Steel Mill Cyberattack
CoreGuard ensures the safe and proper functioning for safety-critical systems
Learn More
Operation Soft Cell Cyberattack
CoreGuard protects critical infrastructure from corruption or highjacking
Learn More
SolarWinds Cyberattack
CoreGuard acts as the last line of defense, protecting downstream endpoints
Learn More
Triton Cyberattack
Our technology blocks even state-sponsored attacks designed to kill
Learn More