-
Recent Posts
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 3)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 2)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 1)
- Incorporating Disruptive Technologies into Existing Products
- Investing in Disruptive Technologies
Articles
Major articles in chronological order:
Archives
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- November 2019
- October 2017
- August 2017
- July 2017
- November 2016
- July 2016
- June 2016
- August 2015
- July 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
Categories
Category Archives: Security
Where Did That Software Come From?
I have an article in the Oct. 9 issue of Military Embedded Systems magazine on software provenance titled Where Did That Software Come From? Where did the software on your embedded system come from? Can you prove it? Can you … Continue reading
Posted in Security
Leave a comment
IoT Security for Developers [Survive IoT Part 5]
Previous articles focused on how to securely design and configure a system based on existing hardware, software, IoT Devices, and networks. If you are developing IoT devices, software, and systems, there is a lot more you can do to develop … Continue reading
Posted in IoT, Security, System Management
Leave a comment
Security by Isolating Insecurity [Survive IoT Part 4]
In my previous post I introduced “Goldilocks Security”, proposing three approaches to security. Solution 1: Ignore Security Safety in the crowd – with tens of millions of cameras out there, why would anyone pick mine? Odds are that the bad … Continue reading
Posted in IoT, Security, System Management
Leave a comment
Goldilocks Security: Bad, Won’t Work, and Plausible [Survive IoT Part 3]
Previous postsdiscussed the security challenge presented by IoT devices, using IP Video Cameras as an example. Now let’s consider some security alternatives: Solution 1: Ignore Security This is the most common approach to IoT security today. And, to a significant … Continue reading
Posted in IoT, Security
Leave a comment
Representative IoT Device: IP Video Camera [Survive IoT Part 2]
The previous article introduced the idea of implementing a production IoT system to really learn how IoT works. One of the most flexible, powerful, and useful IoT sensors is a video camera. Video streams can be used directly. They can … Continue reading
Posted in IoT, Security
Leave a comment
How I Survived the Internet of Things [Survive IoT Part 1]
Working with IoT from a software architecture perspective teaches you a lot, but leaves the nagging question “how does this really work?”. Theory is great and watching other people work is relaxing, but the time comes when I have to … Continue reading
Posted in IoT, Security, System Management
Leave a comment
Embedded systems, meet the Internet of Things
An article in Military Embedded Systems magazine discusses the evolution of embedded systems as influenced by the Internet of Things (IoT): Embedded systems, meet the Internet of Things. The article notes: “In many ways, embedded systems are the progenitor of … Continue reading
Posted in IoT, Security
Leave a comment
Report on IoT (Internet of Things) Security
IoT (Internet of Things) devices have – and in many cases have earned! – a rather poor reputation for security. It is easy to find numerous examples of security issues in various IoT gateways and devices. So I was expecting … Continue reading
Posted in Security
Leave a comment
What Can We Do About Superfish?
Perhaps the greatest question about Superfish is what can we do about it. The first response is to throw technology at it. The challenge here is that the technology used by Superfish has legitimate uses: The core Superfish application is … Continue reading
Posted in Security
Leave a comment
Superfish – Man-in-the-Middle Adware
Superfish has been getting a lot of attention – the Forbes article is one of the better overviews. Instead of jumping in and covering the details of Superfish, let’s look at how it might work in the real world. Let’s … Continue reading
Posted in Security
5 Comments