In today's rapidly evolving technological landscape, the implementation of robust AI safety and security policies is of paramount importance for businesses. These policies function as a protective framework, shielding [...]
ObjectSecurity Awarded Phase II SBIR for Proactively Protecting 5G Devices from Cyber Attacks
ObjectSecurity Awarded Phase II SBIR for Proactively Protecting 5G Devices from Cyber Attacks ObjectSecurity LLC, a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges, [...]
Our supply chain risk analysis team has put together an infographic about supply chain risk in the microelectronics and semiconductor industry, summarizing macro trends at the intersection of supply chain, [...]
ObjectSecurity is also developing a portable version with firmware extraction support for analyzing fielded embedded systems. San Diego, Calif. – Apr 22, 2021 – ObjectSecurity, The Security Automation Company, today [...]
How to extract embedded systems binaries?
In this introductory article, we discuss the challenges around extracting binaries - especially from embedded systems - and how ObjectSecurity's VAPT series is designed to support you. PRESS [...]
Cloud vs. on-prem/offline/portable vulnerability analysis?
This article discusses different vulnerability assessment fielding options. We will discuss the pros and cons of doing binary vulnerability analysis in a SaaS vs. on-premises vs. in-situ. Also, please [...]
(2/24/2021) ObjectSecurity is happy to announce that our poster "Automated Vulnerability Assessment for Embedded Systems" won the Best Poster award at the 28th Annual Network and Distributed System Security Symposium [...]
ObjectSecurity has been developing a number of Artificial Intelligence (AI) driven cybersecurity tools for numerous customers over the last couple of years. Using Machine Learning (ML) for cybersecurity is [...]