Why Should Credit Unions Care About Software Memory Safety Issues?
Cybersecurity leaders and solution vendors have made progress developing and implementing solutions across enterprises to combat malware and the bad guys who deliver it. But blind spots remain, and they leave gaping holes in the security infrastructure everywhere, including at credit unions.
NSA Offers Guidance on Mitigating SW Memory Safety Issues. OnSystem Logic Offers a Solution.
Learn about OnSystem Defender, OnSystem Logic’s solution to mitigate troublesome software memory safety issues.
OnSystem Logic Launches Program for Innovators to Address The Fatal Missing Ingredient in Defending Systems from Malware Attacks
OnSystem Logic (“OSL”) Invites MSP/MSSPs, Software Developers and others to join the Product Evaluation Program (“PEP”) for OnSystem Defender, its High Assurance Application Hardening and Monitoring Solution for Endpoints.
OnSystem Logic LLC Selected by Plug and Play to Participate in 2022 Silicon Valley Showcase
Over the course of several months, OnSystem Logic and the other chosen start-ups are introduced to Plug and Play’s large network of venture capital, government, university, and corporate partners to evaluate the potential for pilots, POCs, investment, and other collaborations. OnSystem Logic will attend exclusive events, mentor sessions, and deal flows, concluding with the May 3rd-4th Plug and Play Silicon Valley May 2022 Summit.
OnSystem Logic Awarded Highly Competitive Grant from the National Science Foundation to Pursue Its Solution to Malicious Malware
OnSystem Logic has been awarded a National Science Foundation (NSF) Small Business Innovation Research (SBIR) grant to conduct continuing research and development (R&D) work on its OnSystem Defender – an application hardening and security assurance product providing the best available protection against harmful malware and application flaws.
What Did the SolarWinds’ Hack Reveal About EDR Solutions?
SolarWinds acknowledged that hackers had inserted malware into a service that provided software updates (“patches”) for its Orion platform, a suite of products broadly used across the U.S. federal government and Fortune 500 firms to monitor the health of their IT networks. The hacking operation began at least as early as March when SolarWinds customers who installed updates to their Orion software were unknowingly welcoming hidden malicious code that could give intruders the same view of their corporate network that in-house IT crews have.