Considering the ubiquity of the Internet of Things, IoT security has taken on increased importance in our connected, data-driven world. In this informative blog post, our security expert lays out the top 10 vulnerabilities IoT systems face so that you can remain as protected as possible.
With the IoT becoming ever-present in our lives, embedded security has taken on increased importance in a world in which data is a valuable currency. This blog post defines the challenge and highlights the top 10 characteristics of a secure system.
With IoT devices continuing to become ubiquitous, it’s vital that manufacturers, service providers, app developers and retailers understand the many IoT security standards and data privacy laws and regulations impacting the Internet of Things.
Katalon takes the need for learning to program or even the complicated setup of all the tools needed to run a test script and throws it all in a one-stop shop that can be picked up by anyone of any technical skill level in short order to create automation.
Josh Datko is the founder of Cryptotronix, co-founder of Keylabs, Inc. and a panelist on our July 15th end-to-end product security webinar. Get to know Josh and register to hear advice for building security into every aspect of an embedded device.
Even the simplest connected device provides a broad range of attack surfaces. Weak security can result in a compromised product, exposed data, downtime and significant damage to a company’s reputation.
These days many companies are looking to IoT to enable their products. In the case of commoditized items, some see an opportunity to differentiate themselves and increase their margins; and with the help of some good marketing, may convince people that they need a smart kettle to get the water boiling 5 minutes before they… View Article
Here’s a quick rundown from a tech perspective of what Google announced last week at its I/O conference: Google.ai Google bases most of its service model on artificial intelligence (AI). In this year’s I/O, they announced some really cool new data-center clusters called Tensor Processing Units (TPUs): huge, heavy-duty number-crunching machines that each provide up… View Article
A couple weeks ago, Kevin Gross posted about the myth of a hacker-proof IoT. His post gave a great high-level overview of ways to make the IoT as secure as possible, and it got me thinking about some more in-depth methods for attempting to attain the security we crave in the IoT industry, especially where… View Article
I was recently invited to give a presentation on security for Internet of Things networking at infocomm 16. While I discussed the topic and scope with the organizers, I didn’t have a good catchy title prepared, so the organizers took it upon themselves to submit one for me: “Hacker-Proof IoT.” Easy, right? While I would… View Article
Another day, another public hack: Today we learned that a “cyber-espionage operation” has used a previously unknown flaw in Adobe Flash to gain information from NATO governments and others. And also 87% of Android devices are vulnerable to numerous known hacks because there’s no good business model to distribute patches on that platform. That’s just… View Article
I was asked by ECN magazine to contribute an article about how SSL/TLS works: It doesn’t seem like too long ago when embedded devices were, by their very nature, somewhat immune to security treats. As we scatter embedded devices everywhere and connect them to the all mighty cloud, we not only increase our exposure to… View Article