The automotive cybersecurity forum put on by the National Highway Traffic Safety Administration (NHTSA) yesterday in Washington, DC, surfaced a wide range of issues and conflicts at the heart of the connected car industry. One clear takeaway from the event was that cars will never be secure.
… Read More
IoT Markets: let’s get real about the numbers
I am not sure about you but whenever I see those big market forecasts for IoT (and I’ve seen a lot)… my brain takes a short cut to “ok, I get it, it’s big”. And I believe it will be. But is “it’s big” that helpful? Or, to put it another way, does it hurt?
Robin Duke-Woolley of Beecham … Read More
How to Secure the Internet of Things (IoT)?
The Internet of Things (IoT) as a concept is fascinating and exciting, but the key to gaining real business value from it, is effective communication between all elements of the architecture so you can deploy applications faster, process and analyze data at lightning speeds, and make decisions as soon as you can.
IoT architecture… Read More
IoT Collateral Damage – it’s not if, but when
Business history is littered with once-successful companies that couldn’t see the market tsunami that was coming their way until it was too late to do anything but stand up and be walloped by a wave of change that obliterated their businesses.
… Read More
Privacy – the Other Face of Security
Security gets a lot of tech press, privacy not so much. A lot of the problem is that while we each know intuitively what we mean by privacy, pinning down an actionable definition is surprisingly tricky, especially when we require that it not intrude in other ways on our rights. Privacy rights are not absolute (you don’t have … Read More
A System Spin on IoT Security
A lot of progress has been made in infrastructure to secure edge nodes in the IoT and to secure communications between edge nodes and gateways, all of which is good and necessary to block manifest evil, but it’s never enough. Perfect security is and always will be an asymptotic goal, so there should always be room for new ideas. To a … Read More
PUF the Magic (IoT) Dragon
Most people are familiar with Biometrics, the measurement of unique physical characteristics, such as fingerprints, and facial features, for the purpose of verifying human identity with a high level of certainty. The iris and even a person’s electrocardiogram (ECG) can be used as a secure biometric identifier.… Read More
HDCP 2.2, Root of Trust, Industry’s First SHA-3 Security IP from Synopsys
Did you know that by 2020 90% of cars will be connected to Internet? Great, but today, there are already more than 100 car models affected with security flaws (Source: theguardian.com, 2015). That 320 apps are installed on average smartphone device? It would be a complete success, but 43% of Android devices allow installation of… Read More
Security Coprocessor Marks a New Approach to Provisioning for IoT Edge Devices
The advent of security coprocessor that offloads the provisioning task from the main MCU or MPU is bringing new possibilities for the Internet of Things (IoT) product developers to secure the edge device at lower cost and power points regardless of the scale.
Hardware engineers often like to say that there is now such thing as software… Read More
Last line of defense for IoT security
If I grab 10 technologists and ask what are the most important issues surrounding the Internet of Things today, one of the popular answers will be “security.” If I then ask them what IoT security means, I probably get 10 different answers. Encryption. Transport protocols. Authentication. Keying. Firewalls. Secure boot. Over-the-air… Read More
CES 2025: All In on AI and Proposed Tariffs