Internet-of-things (IoT) security seems to be passing through various phases as a topic. It started as, “Wait, what? I need security? But why???” Frankly, we probably haven’t moved completely out of that one, but we’ve made progress. Next comes, “What does security mean?” And that continues as well. But a third phase has started, and that’s one of, “OK, I get it, but … Read More → "Security In and On the Application"
Let’s chat about blockchain technology, shall we? If you know almost nothing about blockchains, then it’s probably easy to conflate it with so-called cryptocurrencies like Bitcoin and Ethereum. Those are systems where someone magically created a store of money – well, a store of some sort of artifact that becomes money only when someone decides it’s a good idea to pay for them with … Read More → "Blockchain in IoT Security?"
“A sect or party is an elegant incognito devised to save a man from the vexation of thinking.” – Ralph Waldo Emerson
Hey, buddy, you want a good deal on a gearbox for a city bus? Hardly used, works great. I’ll give you a good deal. Take your pick; I got thousands of ’em.
In fact, … Read More → "Security As a Business Enabler"
Hello security, my old friend
I’ve come to design with you again
Because a hacker came creeping
left its malware while I was sleeping
and the code that was planted in my brain
within the sound of IoT</ … Read More → "Communication’s Third Wave"
“There is no such thing as perfect security, only varying levels of insecurity.” – Salman Rushdie
Spend any time talking with IoT developers and one of two subjects will come up. One, they’ll admit they’re worried about security. And two, they’ll talk about wanting to connect to the cloud.
Trouble is, most IoT developers … Read More → "Pushbutton Security Comes to IoT"
They say that security can’t be designed as an afterthought. That security must be thought through as an early aspect of planning and architecture design. (“They” being… well, the same “they” that say lots of things.)
It would be so much easier if a small design house could have one security expert (at most) that everyone could run to … Read More → "Automatic Security Policy Implementation"