hip webinar automating integration workflow 800x100 (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 287
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 287
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Using Blockchain to Secure IoT

Using Blockchain to Secure IoT
by Ahmed Banafa on 09-08-2016 at 7:00 am

IoT is creating new opportunities and providing a competitive advantage for businesses in current and new markets. It touches everything—not just the data, but how, when, where and why you collect it. The technologies that have created the Internet of Things aren’t changing the internet only, but rather change the things connected… Read More


We Have Met the Enemy (of Security) and It Is Us

We Have Met the Enemy (of Security) and It Is Us
by Bernard Murphy on 09-05-2016 at 7:00 am

(With apologies to Pogo.) For all the great work that we are seeing in improving both software and hardware security, we – not the technology – are in many ways the weakest link in the security chain. Recent reports indicate we are surprisingly easy to fool, despite our much proclaimed awareness of risks.

In a recent experiment at … Read More


Semi execs look at IoT tradeoffs a bit differently

Semi execs look at IoT tradeoffs a bit differently
by Don Dingee on 08-15-2016 at 4:00 pm

What happens when you get a panel of four executives together with an industry-leading journalist to discuss tradeoffs in IoT designs? After the obligatory introductions, Ed Sperling took this group into questions on power, performance, and integration.… Read More


Lethal data injection a much bigger threat

Lethal data injection a much bigger threat
by Don Dingee on 08-08-2016 at 4:00 pm

Watching a spirited debate on Twitter this morning between Tom Peters and some of his followers reminded me of the plot of many spy movies: silently killing an opponent with a lethal injection of some exotic, undetectable poison. We are building in enormous risks in more and more big data systems.… Read More


Establishing Principles for IoT Security

Establishing Principles for IoT Security
by John Moor on 08-07-2016 at 4:00 pm

Much has been said about the potential of IoT. So much so, that it is has been featured at the peak of inflated expectations on Gartner’s hype cycle for quite some time. As the hype inevitably subsides, the reality of delivering the benefits of IoT grows, and the initial excitement turns to concern. Challenges around security and … Read More


Industry Analyst Perspectives On The Apple WWDC 2016 Keynote

Industry Analyst Perspectives On The Apple WWDC 2016 Keynote
by Patrick Moorhead on 07-29-2016 at 12:00 pm

I was in-person and live at Apple’s WWDC keynote in San Francisco. The following are my quick takeaways from the event.

Watch and watchOS:
Apple is focusing on exactly what they should be with watchOS, and that’s speed, ease of use and upping the ante in health and fitness. With the first Watch and watchOS, Apple solved many of the problems… Read More


SMART sensors with OTP memory for the IIoT

SMART sensors with OTP memory for the IIoT
by Don Dingee on 07-25-2016 at 4:00 pm

A few years back before IoT became the buzzword, the industrial automation community had already talking about “smart sensors” since the mid-1990s. The impetus for those discussions was IEEE 1451, a family of standards for adding intelligence and wireless communications to sensors so they could be incorporated into field networks.… Read More


Car Theft Making a Comeback

Car Theft Making a Comeback
by Roger C. Lanctot on 07-24-2016 at 4:00 pm

In the U.K., where vehicle theft has been in a steep decline for the past 20 years, the most widespread advice given by police to car owners is: keep your car keys in your freezer. The most common source of vulnerability these days is the interception of RF signals between keyfobs and cars. For a time, several years ago, there was a rash… Read More


Safety = Security?

Safety = Security?
by John Moor on 07-17-2016 at 4:00 pm

Have you ever wondered what the difference is between safety and security? I would be surprised if you had unless you work in these areas as we tend to use the words interchangeably. Languages such as German, Norwegian and Spanish have one word to mean both – or so I am told by my associates who claim those languages as their mother… Read More


Safety Verification for Software

Safety Verification for Software
by Bernard Murphy on 07-17-2016 at 7:00 am

When automakers are thinking about the safety of an embedded system in a car, while it’s good to know the hardware has been comprehensively tested for safety-specific requirements, that isn’t much help if the software component of the system is not supplied with similarly robust guarantees.

The challenge is that the software … Read More