Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

The perfect storm: How hardware security is getting weaker as the industry changes its cybersecurity models

By Rob Pike
Gaps in Cybersecurity Programs
October 27, 2020

There is a perfect cybersecurity storm brewing today in the computing world. Changes in hardware design, along with cybersecurity solutions that are falling behind in protecting against cyberattacks, are converging to create a potential cyber disaster of major proportions, ready to take place at any moment.

On one hand, we have cybersecurity solutions that are not keeping pace with today’s hackers. In spite of more resources being devoted to cybersecurity, cyber compromises are at an all-time high, with even less experienced hackers now gaining access.  At the same time, hardware designers are changing their industry standards and direction. This change enables hackers anytime access to hardware - even when it is powered off. The result of this combination is a perfect cyber storm, ready for disaster.

 

The battle between BIOS and UEFI in hardware design

For years, BIOS has been a firmware standard in hardware design.  Over the years however, hardware designers have been moving towards UEFI instead of BIOS. 

There are a number of reasons for this move, including increased infrastructure manageability over BIOS. Unfortunately, along with increased infrastructure manageability, UEFI comes with a security flaw; the ability for hackers to gain access to your computer, even when it is turned off.

How this happens is relatively simple. With UEFI, security layers are added in the UEFI stack, with custom web applications added to the stack to control settings. 

The problem with adding security layers to the UEFI is it requires many more lines of code to the system’s firmware, into the thousands. These added lines of code can allow hackers remote access to the physical hardware layer of systems today – often even before the operating system is booted. Meaning hackers have the potential to access your laptop, even when it is turned off.

This is a very real problem. At Cyemptive, we are seeing more bugs and remote attacks of this nature, with hackers attempting to gain control over the hardware and sometimes even the full network stack before the operating system is booted. The worms and exploits we see on the UEFI stack are now showing up in the UEFI layer, because they are enabling similar application stacks to be loaded. This in turn causes even more exploits, weakening the security model of something that should be simple is turning into a complete mess.

 

The failure of today’s cybersecurity solutions

Theoretically, if today’s cyber solutions were able to adequately protect against cyberattacks, the vulnerabilities in hardware design would not be nearly as devastating. But as we all know, with hackers if they think something can be hacked they will, if just for the sport of it. And they are.

The time for hackers to break into any environment is mere seconds and minutes to get data out of a network. Unfortunately, today’s detection technologies are hitting such high false positives and false negatives, it has put the decline on progress on detecting and stopping the elite hackers of the world almost impossible to stop them. Even the less experienced hackers have gotten traction on infiltrating networks and systems with the use of artificial intelligence (AI) tools.   

Speaking of AI, there has been much talk about it and machine learning as the solution for cyber protection. The one big comment that most people have about AI for cybersecurity is not explaining that AI stands for “Already Infiltrated” to the elites of the world. AI is too little too late. Even with AI, today’s cybersecurity solutions take days, weeks and even months to identify attacks, while hackers only need seconds and minutes to get in and out with your data. It just isn’t fast enough to solve the problem.

The result is that hackers can sneak past today’s enterprise cyber defenses. Into your hardware even when it is turned off. 

 

Solutions

What, then, can the industry do?

As a first step, hardware designers should re-think how they approach security. A different approach to hardware security is needed – one that does not include thousands of lines of code in the UEFI stack that allows hackers remote access to our physical hardware layer of systems.

Sometimes simple is best. Legacy BIOS mode has seen less security problems than what is now showing up in the current UEFI implementations, and we believe is a better security alternative than UEFI. 

More manageability in infrastructure is a laudable goal; however, enabling hackers to remotely hijack into the system’s UEFI stack before an OS is enabled is the wrong approach to cybersecurity. Legacy BIOS mode is a solution that is both proven and safer than UEFI. Let’s take a step back, and keep the hackers off our hardware, whether it is turned on or off, and consider going back to a simpler approach to hardware security design.

KEYWORDS: cyber security hackers information security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob pike1

Rob Pike is founder and CEO of Cyemptive Technologies, a provider of pre-emptive cybersecurity products, and brings a wealth of experience in creating new technologies and bringing them to market for companies both large and small.  Pike founded Cyemptive in 2014, with his vision of ushering in a new era of cybersecurity. He also has served as Chief Strategy Officer at Hitachi Data Systems in Japan, where he invented Hitachi’s cloud platform UCP, as well as at Microsoft, where he served in a variety of capacities culminating with Virtualization Architect and invented an internal cloud solution. He has founded several startups and holds numerous patents in servers, storage, networking, monitoring, security and management.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-shield

    The perfect storm: Finding new ways to navigate and mitigate the cybersecurity pandemic

    See More
  • cloud-enews

    How to Utilize the Cloud to Mitigate Cybersecurity Risks to Security Hardware

    See More
  • covid-19 survey

    Survey Shows How the Security Industry is Mitigating Risk during COVID-19

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing