Embedded Insiders: What Are the Table Stakes for IoT Security

July 17, 2020 Perry Cohen
 
 

In this edition of the Embedded Insiders, Brandon and Rich ponder when “enough is enough” in terms of IoT device security. Because implementing robust security is so time consuming and expensive, why haven’t we just created development workflows that make it more costly to NOT use security?

Later, the Insiders are joined by Jeremy Boone, Technical Director of The NCC Group, security analysis firm. Together, the trio consider how flaws at all levels of the IoT solution stack can be exploited, as well as engineering best practices that can minimize these vulnerabilities. This boils down to CYA with CIA.

Finally, Jean Labrosse is back with more “Things That Annoy a Veteran Software Engineer” where he explains why it drives him nuts when a programmer over-uses asserts.

About the Author

Perry Cohen

Perry Cohen, associate editor for Embedded Computing Design, is responsible for web content editing and creation in addition to podcast production. He also assists with the publication’s social media efforts which include strategic posting, follower engagement, and social media analysis. Before joining the ECD editorial team, Perry has been published on both local and national news platforms including KTAR.com (Phoenix), ArizonaSports.com (Phoenix), AZFamily.com, Cronkite News, and MLB/MiLB among others. Perry received a BA in Journalism from the Walter Cronkite School of Journalism and Mass Communications at Arizona State university. He can be reached by email at perry.cohen@opensysmedia.com. Follow Perry’s work and ECD content on his twitter account @pcohen21.

Follow on Twitter Follow on Linkedin More Content by Perry Cohen
Previous Article
Maintain Security From Design To Manufacture Using Secure Contexts
Maintain Security From Design To Manufacture Using Secure Contexts

Secure contexts are a must in industrial platforms, especially if it’s a “connected” platform.

Next Article
Atmosic Technologies Extends Battery Life and Range for TraceSafe AllSafe Wristbands, Enabling Robust Contact Tracing
Atmosic Technologies Extends Battery Life and Range for TraceSafe AllSafe Wristbands, Enabling Robust Contact Tracing

TraceSafe's Wristbands and Exposure Notification System Will Assist Safe Re-Opening of Toronto Wolfpack's L...