IoT Security: Technology Is Only One Part Of The Equation


Survey after survey on the adoption of the IoT punctuates that security and data privacy continue to be the top concerns with any new implementation. It used to be that security was all about protecting data (business, personal ID, etc.), but as more devices are connected to the IoT, security concerns reach far beyond just the value inherent in the data. According to Gartner, nearly 5.5 ... » read more

Scare Of The Month: The Breach At Juniper


Details are sketchy, but it was definitely a back door hack of Juniper. That almost always points in the direction of an inside job. So far, no one quite knows how exactly the hack was accomplished. But what scares me is that, supposedly, this code has been in the system for three years already. Drilling down a bit, it turns out there was more than one back door. One of them allowed ... » read more

What’s Really Inside?


Is it just paranoia, or do devices ranging from industrial controls to military hardware really contain malicious code, Trojan Horses, and remotely triggered back doors? The answer is "maybe not" if you're an optimist, and "maybe" if you're a pessimist, but no one really knows for sure. And that's what really worries security experts, particularly as more devices are connected to other devices.... » read more

Tech Talk: Mobile Security (Part 2)


Simon Blake Wilson of Rambus' Cryptography Research Division talks about where security needs to fit into the design flow and where the biggest risks are. To view part one of this video, click here. [youtube vid=_nnniakpP3M] » read more