How do device software processes evolve to better protect our next-generation IoT devic¬es? First, it starts with a sound plan that includes next-generation software assurance and a “security-first” methodology. Teams need to rethink how they deliver software quickly – with security, safety, and quality in mind from design to deployment. But “rethinking” should not be “restarting.” To do this successfully, teams should leverage the best tools available that help them analyze the software they are developing, looking for problems that IoT presents – including both in-house source and 3rd-party binary code.
- Embedded Security Webinar Series
- Machine Learning
- Power Electronics
- Dev Tools & OS
- Dev Kit Selector
- White Papers
- Upcoming Activities & Events
- Embedded Executive
Previous White Paper
Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial...
We also recommend:
You need to be sure that the software you send to the plant is exactly the same as the software that gets installed into the manufactured products. No exceptions.
Why do less than four percent of IoT devices implement the security measures necessary to protect an organization's IP and customers from local or network-borne threats?
In this series of five webcasts, we’ll run through the five key security-related problems that will impact your design, and more importantly, how to solve them.
Secure contexts are a must in industrial platforms, especially if it’s a “connected” platform.
You’ve spent months or even years creating IP that belongs to your company and/or its customers. In many cases, that IP is what makes you stand out from your competitors.
According to industry analysts, we could see one trillion IoT connections by the year 2035, with the transfer of more than 2 Zbytes of data just from consumer devices alone.
This week on the Embedded Insiders, Brandon and Rich discuss an age-old controversy: What’s more secure? Proprietary or open-source software?
The Trusted Computing group (TCG) released its TPM 2.0 Library specification Revision 1.59.
The Ada language abstracts most direct interaction with memory onto compilers, transitioning things like memory checks from a manual human operation to automatic. Get ready to save tons of debug time.
Crystal Display Systems are helping to ensure security and safety as the world attempts to resume back to normal working life.
The number of crimes related to the unauthorized use of personal data on the Internet is increasing. Cybersecurity Ventures predicted that cybercrime will cost the world $6 trillion annually.
The Internet of Secure Things Alliance (IoXT) is pushing a common (and obvious) goal for our industry. They want to keep all of our connected devices secure.
Adding more cloud compute won’t solve the problem of managing exponentially growing quantities of data for IoT devices. We need to shift much of the “thinking” from the cloud to endpoint devices...
This paper highlights why a software approach to IoT security implementation can no longer meet acceptable levels of assurance and protection and explains the reasons why a hardware-based approach...
IAR Systems released its newest version the functional safety edition of IAR Embedded Workbench for Renesas’ RX Family of microcontrollers (MCUs).
VARTA Microbattery's trade fair presentation focused on Nickel-Metal Hydride cells, Lithium coin cells, and Lithium-Ion coin cells (microbatteries) as energy supply for applications in the IoT.
NXP is excited to bring you the NXP eXperience – an online and interactive destination for all our news, content and training as it was originally planned for the show.
In this week's Embedded Executives, Rich Nass is joined by Mike Nicholson, Embedded Software/Systems Architect, MultiTech.
Computers, servers and the people that operate them used to be the primary target of attackers. Today, because of increasing connectivity and dependence on networks, network equipment has become...
This paper describes how static analysis plays a key role in risk management of medical device software development.