30 May '16, 4pm

#IoT #IoTSecurity

At the top of their list is a thorough set of documentation. Product docs describing the function, all ports or inputs, all source code, build info, and binary or byte code. Design docs detailing any risk analyses and mitigations. Usage docs covering user instructions, including how to use securely; interfaces and communications protocols; software component version info; event logging. There’s an interesting standard that comes up a few times that says that some security function – like authentication – must be as hard to get around as it would be to guess your way through – like guessing the key.

Full article: http://www.eejournal.com/archives/articles/20160530-newce...

Tweets

Turkey, US Diverge Over Procurement and Security

Turkey, US Diverge Over Procurement and Security

defensenews.com 31 May '16, 5pm

Turkey sought in 2009 US permission to acquire MQ-9 Reapers but Turkish officials recently said the country has moved on b...

Security breach at airport in #Germany prompts ...

straitstimes.com 30 May '16, 11am

BERLIN (Reuters) - A person trespassed a security checkpoint at the Cologne-Bonn airport in western Germany on Monday (May...

Group Presents Security Road Map for Future Isr...

defensenews.com 31 May '16, 9pm

Group Presents Security Road Map for Future Israel-Palestine Deal A new report envisions a security plan for a two-state p...

Coolest, but Least Secure, Security Device

Coolest, but Least Secure, Security Device

hackaday.com 28 May '16, 11pm

[Matikas] apparently forgets to lock the screen on his computer when he gets up to grab a coffee. And he apparently works ...

Israeli Ex-Generals Push 'Security First' Plan ...

defensenews.com 29 May '16, 5pm

Israeli Ex-Generals Push 'Security First' Plan for West Bank, Gaza Fed up with security-sapping paralysis at home and fear...

IoT Security is Imec Target | EE Times

IoT Security is Imec Target | EE Times

eetimes.com 25 May '16, 12pm

BRUSSELS –Engineers need to plug security holes in the Internet of Things, according to Imec launching a program with that...

Financial Security, Financial Independence, Fin...

thefinance.sg 28 May '16, 2pm

Since no one wants to poke it, I’ll take the bait! Different words have been thrown around carelessly. What the fish is Fi...

South China Sea set to dominate Singapore secur...

reuters.com 01 Jun '16, 11pm

SINGAPORE/HONG KONG Roiling tensions in the South China Sea are set to dominate Asia's biggest security summit starting in...

South China Sea set to dominate Singapore secur...

reuters.com 01 Jun '16, 11pm

SINGAPORE/HONG KONG Roiling tensions in the South China Sea are set to dominate Asia's biggest security summit starting in...

South China Sea set to dominate Singapore secur...

reuters.com 01 Jun '16, 11pm

SINGAPORE/HONG KONG Roiling tensions in the South China Sea are set to dominate Asia's biggest security summit starting in...

16 Megapixel Outdoor Security Camera on the Cheap

16 Megapixel Outdoor Security Camera on the Cheap

hackaday.com 23 May '16, 3pm

Looking for a high quality security camera? Despite digital cameras continually getting better, and less expensive, securi...

Latest Whitepaper Puts a Lock on IoT Security - DesignNews

Latest Whitepaper Puts a Lock on IoT Security -...

designnews.com 26 May '16, 2pm

Security is critical for IoT devices, but how much is needed for various types of devices? Control systems in nuclear plan...