22 May '15, 6pm

An end-to-end approach is needed for IoT device security - Embedded Computing Design:

An end-to-end approach is needed for IoT device security - Embedded Computing Design:

As IoT devices proliferate, the vulnerabilities scale linearly. Most of the "things" connected to the Internet of Things (IoT) are produced companies not accustomed to thinking in terms of connectivity. These manufacturers are experts in water heaters or door locks or coffee makers, but they probably don't know what a really good connected water heater or door lock or coffee maker should be. And they certainly haven't had to worry about the kinds of security threats that come with IoT connectivity. In the IoT, the same connectivity pathways that enable all the benefits – homeowners controlling or receiving alerts about their heating, lighting, and home security systems even from a distance; people tracking various biometric values to optimize their health and fitness; manufacturers gathering invaluable data on where, how, and how often their products are being used – also ...

Full article: http://embedded-computing.com/articles/an-end-to-end-appr...

Tweets

Engineering Essentials: IoT Standards and Frameworks

Engineering Essentials: IoT Standards and Frame...

electronicdesign.com 22 May '15, 2pm

All these frameworks have a number of common goals, including reducing time to market, offloading core development, and pr...

Top 7 consumer-tailored IoT devices

Top 7 consumer-tailored IoT devices

edn.com 22 May '15, 11pm

The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existin...

Will Billions of IoT Devices Become Billions of Security Vulnerabilities?

Will Billions of IoT Devices Become Billions of...

designnews.com 19 May '15, 4pm

Conventional approaches to IT security will leave the Internet of Things (IoT) vulnerable to devastating attacks, accordin...

"#IoT #Security Calls for Action"

eetimes.com 24 May '15, 11pm

To enable the full potential of the Internet of Things, engineers need to address the security challenge through a combina...

Did you catch this great piece by @IEEEIoT's ow...

eetimes.com 19 May '15, 4pm

The Internet of Things can bring down barriers that currently exist between vertical markets and domains so valuable infor...

Challenges for Embedded Technology Designers in...

designnews.com 26 May '15, 4pm

The momentum behind embedded intelligent connectivity continues to increase at a phenomenal rate as a result of the Intern...

3 Ways the “Internet of Moving Things” is Trans...

Mobile-based technology is transforming bus travel in cities like Jinotega, Nicaragua and making public transit more respo...

IoT Security Groundswell Gathers cc to @iamthec...

eetimes.com 29 May '15, 7am

After plenty of talk, a wave of real action aimed at solving the Internet of Things's security problems is on the rise. At...

7 takeaways surrounding embedded security: #IoT #data #digitaljo…

7 takeaways surrounding embedded security: #IoT...

designnews.com 17 May '15, 5pm

You almost never hear anyone mention this, but most of the "legacy" avionics systems aboard commercial aircraft (the ones ...