Securing The Industrial Internet Of Things

Objects, sensors, actuators and controllers that were once designed for stand-alone operation are now increasingly connected by means of intelligent software and networks – forming the basis of the Industrial Internet of Things (IIoT). To be sure, GE defines the IIoT as “a network of a multitude of devices connected by communications technologies that results in systems that can monitor, co... » read more

IoT Security Challenges, Opportunities

The specter of cybersecurity is haunting the Internet of Things—or more specifically, the lack of it. Big companies in information technology and telecommunications have embraced the [getkc id="76" kc_name="IoT"] as a significant business opportunity, and the field is inspiring hundreds of startups in Silicon Valley and elsewhere. Venture capitalists hungrily eye the IoT, betting on which ... » read more

Security: Losses Outpace Gains

Paul Kocher, chief scientist in [getentity id="22671" e_name="Rambus'"] Cryptography Research Division, sat down with Semiconductor Engineering to discuss the new threats to security, artificial intelligence and machine learning, and how to engineer a secure system. What follows are excerpts of that conversation. SE: Where are we with security? It seems that rather than getting better, thing... » read more

Testing For Security

Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

Security Risk Escalating In 2015

Never has there been a more committed effort for malevolent entities to try to leak data, damage infrastructures, and wreak havoc on data essential to our lives. And never has there been a more opportunistic time for the security industry to put their best effort forward and answer the malfeasance challenge. So what is the current state of cyber security? "Unfortunately, there isn’t a l... » read more