IoT Devices Can Kill and What Chip Makers Need to Do Now

IoT Devices Can Kill and What Chip Makers Need to Do Now
by Daniel Nenni on 01-07-2019 at 12:00 pm

After the onslaught of IoT devices Christmas brought to the masses we really need to talk about security or lack thereof. Do me a favor and count how many IoT devices you have now? Our house IoT count is probably a bit higher than average due to my technology addiction but we are firmly in the double digits and the security breach stories… Read More


IoT Security Process Variation to the Rescue

IoT Security Process Variation to the Rescue
by Tom Simon on 11-12-2018 at 12:00 pm

Unique device identities are at the core of all computer security systems. Just as important is that each unique identity cannot be copied, because once copied they can be used illegitimately. Unique device IDs are used to ensure that communications are directed to the correct device. And they also provide the ability to encrypt… Read More


How many engineers does it take to get an IoT security certificate?

How many engineers does it take to get an IoT security certificate?
by Diya Soubra on 01-22-2018 at 12:00 pm

Spoiler alert, the answer is none!

Let me take you back to the beginning to explain that answer.


For the sake of this discussion, I will reduce a complex IoT solution to three fundamental blocks:

  • IoT node
  • IoT Gateway
  • IoT Server

The IoT node is a sensor that converts analog, physical world context into digital data. The node has to haveRead More


Presto Engineering – Outsourced Secure Provisioning – Even Their Secrets Have Secrets

Presto Engineering – Outsourced Secure Provisioning – Even Their Secrets Have Secrets
by Mitch Heins on 10-05-2017 at 12:00 pm

Image RemovedWhen I first heard about Presto Engineering I was enamored by a statement on their web site that claimed that one of their secured solutions included, “The ability to incorporate your secrets without knowing them”. If Mr. Spock would have been in the room his eyebrow would have certainly raised. Indeed, what does that… Read More


Intrinsix Fields Ultra-Low Power Security IP for the IoT Market

Intrinsix Fields Ultra-Low Power Security IP for the IoT Market
by Mitch Heins on 09-21-2017 at 7:00 pm

Image RemovedAs the Internet-of-Things (IoT) market continues to grow, the industry is coming to grips with the need to secure their IoT systems across the entire spectrum of IoT devices (edge, gateway, and cloud). One need only look back to the 2016 distributed denial-of-service (DDoS) attacks that caused internet outages … Read More


Overcoming the Challenges of Creating Custom SoCs for IoT

Overcoming the Challenges of Creating Custom SoCs for IoT
by Mitch Heins on 06-30-2017 at 7:00 am

As the Internet of Things (IoT) opportunities continues to expand, companies are working hard to bring System-on-Chip (SoC) solutions to market in the hopes of garnering market share and revenue. However, it’s not as easy as it may first seem. Companies are running into a series of issues that stand between them and capturing the… Read More


IoT and Blockchain Convergence

IoT and Blockchain Convergence
by Ahmed Banafa on 01-17-2017 at 12:00 pm

The Internet of Things (IoT) as a concept is fascinating and exciting, but one of the major challenging aspects of IoT is having a secure ecosystem encompassing all building blocks of IoT-architecture. Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies… Read More


IoT and a few of my favourite things

IoT and a few of my favourite things
by John Moor on 12-27-2016 at 5:00 pm

I was at the 27th Hewlett Packard Colloquium on Information Security at Royal Holloway, University of London this week and met Alan Stockey of RiskingIT.com. Alan told me about a little ditty he wrote on IoT security to the tune of “My Favourite Things” from the Sound of Music. Amused me and he’s allowed me to share… Read More


Predictions for the IOT in 2017

Predictions for the IOT in 2017
by Bill McCabe on 12-21-2016 at 2:00 pm

Image RemovedAlthough we are a far cry from Nostradamus, there are some fairly reliable predictions that can be made about 2017 and beyond.

The first bold prediction is that 2017 will see a bump in security, and a demand for skilled workers. Since there will be a growing demand for AI and the containers that are utilized to transmit… Read More


Webinar: ARM Security Solution for IoT

Webinar: ARM Security Solution for IoT
by Daniel Nenni on 12-08-2016 at 4:00 pm

Yossi Weisblum will be presenting ARM’s IoT security solution during the Open Silicon webinar that I am moderating next week. Yossi manages product marketing for ARM’s CryptoCell subsystem. He has an extensive background in product marketing across several platforms, including connectivity, wireless, multimedia and mobile.… Read More