Strategic Principles For Securing The Internet Of Things (IoT)


Source: U.S. Department Of Homeland Security. Version 1.0 Dated: 11/15/16 "The growth of network-connected devices, systems, and services comprising the Internet of Things (IoT) creates immense opportunities and benefits for our society. IoT security, however, has not kept up with the rapid pace of innovation and deployment, creating substantial safety and economic risks. This document expla... » read more

How To Build Security Into Your IoT Wearable Device


In today's connected world, IoT wearable devices should be built from the ground up to include basic, fundamental security capabilities. This whitepaper explains the key security technologies critical for creating a secure IoT embedded device. Topics include code and boot-time authentication, establishing a chain of trust, process separation and space partitioning, using a safety-certified oper... » read more

Making Secure Chips For IoT Devices


Chips and modules going into Internet of Things node devices must have cybersecurity features designed and built into them. Multiple vendors are responding with products meant to keep the IoT devices protected from the cyberattacks that are becoming more common. While [getkc id="76" kc_name="IoT"] privacy remains a key concern for consumers and homeowners, IoT security has taken on top-of-mi... » read more

Will 2017 Be The Year Of DDoS?


Forrester Research sees a rough year ahead for cyber security. Indeed, targeted espionage, ransomware, denial of service, privacy breaches and more are expected to escalate in 2017. In addition, Forrester Researcher analysts predict that more than 500,000 Internet of Things (IoT) devices will be compromised in 2017. Perhaps not surprisingly, IDC analyst Kevin Lonergan recently warned that Io... » read more

Tools For Heterogeneous System Development


System architects look to both heterogeneous and homogeneous computing when there are no other options available, but the current thinking is that a system-level software methodology could simplify the design, ease integration of various blocks, and potentially improve performance for less power. While the theory appears sound enough, implementing it has turned out to be harder than expected. ... » read more

Overcoming The Limits Of Scaling


Semiconductor Engineering sat down to discuss the increasing reliance on architectural choices for improvements in power, performance and area, with [getperson id="11425" comment=" Sundari Mitra"], CEO of [getentity id="22535" comment="NetSpeed Systems"]; Charlie Janac, chairman and CEO of [getentity id="22674" e_name="Arteris"]; [getperson id="11032" comment="Simon Davidmann"] CEO of [getentit... » read more

Five Ways To Avoid Being The Next IoT Security Headline


Whether it is the remote hacking of cars or the rise of the IoT botnet we have all read the scary headlines: security for the IoT is a growing issue. But how exactly do you stop your company and your product appearing on the front page, as part of the latest security violation story? Security in IoT is more than just the processor, it requires an approach that protects the entire system and all... » read more

IoT Security Risks Grow


Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in [getentity id="22186" comment="ARM"]'s Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at GlobalFoundries; Chowdary Yanamadala, senior vice president of business development at [getentity id="22819" comment="Glob... » read more

Incorporating IoT Security At The Design Phase


The U.S. Department of Homeland Security (DHS) has outlined six Strategic Principles for securing the Internet of Things. Perhaps the most important of these principles is the concept of implementing security at the design phase, with the DHS recommending the use of hardware that incorporates security features to strengthen the protection and integrity of a device. This includes leveraging comp... » read more

IoT, Architectures, And Security


Mike Muller, CTO of [getentity id="22186" comment="ARM"], sat down with Semiconductor Engineering to talk about security, IoT market changes, and future technology requirements. What follows are excerpts of that conversation. SE: Security is a growing problem. How do we deal with it? Muller: However fast the world is moving, if you look at fundamental hardware and system design, it’s ru... » read more

← Older posts Newer posts →