The most secure system in the world is powered off, embedded in concrete, and mined with tamper-sensitive explosives. Unfortunately, it is also the most useless system in the world. In order for a system to be useful, it needs to interact with the environment and provide some level of functionality. Historically, embedded systems were mostly islands – that is, they provided their functionality in a stand-alone manner, and weren’t connected, or had limited connectivity to other systems. With these kinds of systems, it was relatively easy to analyze their security – the number of ways of getting in and compromising the operation was extremely limited. Systems today are more connected. A lot of these protocols and connections are incorporated into modern devices as a matter of course, without enough thought given to their security implications.
- Machine Learning
- Power Electronics
- Dev Tools & OS
- Dev Kit Selector
- White Papers
- Upcoming Activities & Events
- embedded world 2020
- Embedded Executive
We also recommend:
The Role of Static Analysis in Management of Cybersecurity in Medical Devices
This paper describes how static analysis plays a key role in risk management of medical device software development.
Enhancing Code Reviews with Static Analysis - GrammaTech
This paper discusses how static analysis tools provide an ideal (and automated) companion to code reviews by supporting the process and increasing the defect removal rate.
DevSecOps - Integrating Static Application Security Tools (SAST) in DevSecOps
This paper takes a look at the role of static application security testing tools (SAST) and in particular GrammaTech CodeSonar and how it can be used in DevSecOps and continuous development pipelines
IoT Security Top 20 Design Principles
IoT Security Top 20 Design Principles
IAR Systems Updates its Security Development Tool C-Trust
IAR Systems launched a new version of its security development tool C-Trust.
Think Local: How to Migrate Intelligence from the Cloud to Embedded Devices at the Edge
Adding more cloud compute won’t solve the problem of managing exponentially growing quantities of data for IoT devices. We need to shift much of the “thinking” from the cloud to endpoint devices...
Medical Device Safety and Security: Obvious but not easy to achieve
With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two...
Why the Security Market is Taking a Closer Look at the Use of Radar Sensors as Opposed to the Popular Passive Infrared (PIR)
Radar technology is an excellent contender to PIR, as it offers added capabilities. PIR has certain limitations that are not desirable in the security market for which radar detection can overcome.
OmniVision Expands Nyxel NIR and ULL Sensor Resolution to 4 MP
OmniVision Technologies released the OS04A10, a 2.9-micron pixel image sensor with 4-megapixel (MP) resolution, adding to the Nyxel family of near-infrared (NIR) and ultra-low light (ULL) sensors.
AMG Systems Releases Mini Media Converter for Security and Transport Applications
Housed in a mini chassis, AMG’s new Mini media converters are ideal for connecting field-based equipment to Ethernet networks over long distances via fiber.
Take the Steps to Secure Your Software Supply Chain – What are You Waiting For?
Learn how binary scanning is emerging as a critical activity for securing the complex software supply chain that exists in vehicles.
Demystifying the Physically Unclonable Function (PUF)
PUF stands for physically unclonable function. From a technical standpoint, PUF exploits minute differences in silicon that appear from chip to chip to create a binary value.
How to Establish an Effective Data Quality Policy for Your Business
By focusing on ad-hoc incident resolution, organizations struggle to identify and address recurring data quality problems in a structural way.
Microchip AC164160 Secure IoT Sensor Node
This development/evaluation board features Wi-Fi connectivity, an ATmega4808 processor, and an ATECC608A cryptographic co-processor to restrict data to authorized users and systems.
CES 2019: Attendance Slightly Down, Innovation Way, Way Up
Attendance may have been down at the 2019 Consumer Electronics Show, based on observed foot traffic alone. But, that didn't stop electronics vendors from innovating at the highest levels. From...
Another Record Year for Vulnerabilities … Time to Join the CIA?
No, not that CIA. I mean the security concept known as the CIA Triad that refers to Confidentiality, Integrity and Availability.
OCF 1.0 ratified by ISO/IEC JTC 1 as secure IoT interoperability protocol
The OCF standard will be published as ISO/IEC 30118 (Parts 1-6).
"Zero Touch" IoT Security Is Key to Continued Growth
By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...
IoT Security (Finally) Delivers ROI
To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable...
Securing the IIoT with Flexible Firewalls