We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Podcasts

Blog

\ Blog\ Infrastructure

 


September 18, 2017 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Poulin: The Economics of IoT Fear and Uncertainty

Information- (and now device-) security is an underappreciated field. It’s anti-climactic and difficult to justify the cost of building security in, bolting security on and implementing security controls for the operating environment. But it's up to us in the community to become early adopters and work with the manufacturers to make products as secure as possible for the general public. 

Read More »


August 8, 2017 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Poulin: What I Hacked this Summer in Vegas

Another July has come and gone, leaving the security community with a collective information hangover from Black Hat, DEF CON and BSidesLV. Hardware exploitation, IoT, machine-learning and blockchain emerged as some of the major themes from the conferences this year. 

Read More »


July 25, 2017 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Poulin: You Mod it, You Own It?

If your toaster catches fire because of a design defect, you can sue the manufacturer. If your computer is compromised because of a software vulnerability, that’s your problem (remember that end-user license agreement you clicked through without reading?) The Internet of Things is the intersection of products and software, and the result is a muddied liability equation.

Read More »


March 20, 2017 | Vendor and Partner Management
By Kevin Beaver, IANS Faculty

 Beaver: Taking Responsibility for Vendor Product Security

At the end of the day, you can't blame poor security and the subsequent incidents and breaches on someone else. Rather than more finger-pointing, regulation and red tape, let's have the discipline to do what's right and take the proper steps to reasonably lock things down – even if it's someone else's product.

Read More »


February 21, 2017 | Embedded Systems and Internet of Things
By Kevin Beaver, IANS Faculty

 Beaver: IoT at RSA Brings a New Focus on Old Problems

Well, another RSA Conference has come and gone. While "artificial intelligence" was one of the big buzzwords, what stood out to me the most was the focus being put on IoT security. There’s no doubt IoT is that next wave of systems that we are going to be responsible for locking down, not unlike wireless networks and mobile devices in recent years.

Read More »


February 17, 2017 | Endpoints
By Daniel Maloof, IANS Managing Editor

 CrowdStrike, NSS Dust-up Erodes Trust in Product Testing

With RSA Conference 2017 wrapping up this week, there’s plenty to talk about in the realm of security technology and innovation. But one story that may not be going away anytime soon and could have wide-ranging implications in the security product testing space is the ongoing feud between next-gen endpoint security firm CrowdStrike and NSS Labs, a security product research firm.

Read More »


January 30, 2017 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Poulin: 3 Complications Making it Difficult to Secure IoT

Let’s play amateur psychologist for a second. What’s the first word that pops into your mind when someone says “IoT?” I’ve conducted this test on a variety of subjects (e.g., my colleagues, friends and family) and the results are all over the board. Throw “security” on top, and the results spread out like a crate of Slinkys on the Spanish Steps.

Read More »