Category Archives: Security

Posts related to security.

IoT Security for Developers

Previous articles focused on how to securely design and configure a system based on existing hardware, software, IoT Devices, and networks. If you are developing IoT devices, software, and systems, there is a lot more you can do to develop … Continue reading

Posted in IoT, Security, System Management | Leave a comment

Security by Isolating Insecurity

In my previous post I introduced “Goldilocks Security”, proposing three approaches to security. Solution 1: Ignore Security Safety in the crowd – with tens of millions of cameras out there, why would anyone pick mine? Odds are that the bad … Continue reading

Posted in IoT, Security, System Management | Leave a comment

Goldilocks Security: Bad, Won’t Work, and Plausible

Previous posts discussed the security challenge presented by IoT devices, using IP Video Cameras as an example. Now let’s consider some security alternatives: Solution 1: Ignore Security This is the most common approach to IoT security today. And, to a … Continue reading

Posted in IoT, Security | Leave a comment

Representative IoT Device: IP Video Camera

One of the most flexible, powerful, and useful IoT sensors is a video camera. Video streams can be used directly. They can also be analyzed using modern software and an incredible range of information extracted from the images: motion detection … Continue reading

Posted in IoT, Security | Leave a comment

How I Survived the Internet of Things

Working with IoT from a software architecture perspective teaches you a lot, but leaves the nagging question “how does this really work?”. Theory is great and watching other people work is relaxing, but the time comes when I have to … Continue reading

Posted in IoT, Security | Leave a comment

Report on IoT (Internet of Things) Security

IoT (Internet of Things) devices have – and in many cases have earned! – a rather poor reputation for security. It is easy to find numerous examples of security issues in various IoT gateways and devices. So I was expecting … Continue reading

Posted in Security | Leave a comment

What Can We Do About Superfish?

Perhaps the greatest question about Superfish is what can we do about it. The first response is to throw technology at it. The challenge here is that the technology used by Superfish has legitimate uses: The core Superfish application is … Continue reading

Posted in Security | Leave a comment