IoT and M2M Safety and Security

Echelon, Freescale, GrammaTech, RTI

The proliferation of connected devices coupled with network infrastructure advances have ushered in a new era of communication and machine-to-machine (M2M) automation in all industries. These advances bring significant risk — attacks on systems have become "purpose-built" — targeting specific machines in order to access unauthorized information or cause system failures. IoT and M2M systems require a combination of silicon and software solutions designed to mitigate these purpose-built attacks.
Watch Now

Spotlight

Mike Muller, CTO of ARM took us straight to the punch with his talk at the IoT Security Summit 2015. The ugly truth is that, despite your best efforts to engineer a secure system for IoT, if your products are successful you will be compromised. Tech providers have to think very carefully about how attackers might break into their systems, they have to consider the entire attack surface and ensure security is architected in, and this needs to happen from manufacture right through to end of life. The bad news is that a hacker only needs to find one exploit and all that could be undone.


OTHER ON-DEMAND WEBINARS

Internet of Things Unleashed

NETSCOUT

It’s not enough to just know what IoT is and to accept that it’s on its way to a network near you. You must prepare. The most reaching effects of IoT will be the technical challenges around device density & security and the costs associated with device management. Both will necessitate significant technical and policy changes.
Watch Now

The five elements of IoT security, open source to the rescue!

Eclipse Foundation

More and more IoT vulnerabilities are found and showcased at security events. From connected thermostats to power plants! Insecurity became the favorite subject for creating catchy IoT headlines: "Connected killer toaster", "Fridges changed into spamming machines","Privacy concerns around connected home".
Watch Now

Creating a Connected Customer Experience

ThingWorx, a PTC Technology

Webcast was originally broadcast on Thursday, April 2, 2015 at 12 p.m. EDT.
Watch Now

PTC Software Modeling Solution Webcast & Demo

PTC

In this webcast you’ll hear how the PTC Software Modeling solution allows embedded, IoT and other software developers to apply the powerful and standards-based UML design language, and automatically generate software code in popular programming languages. Changes to either models or code are automatically synchronized to keep model and code in perfect alignment.
Watch Now

Spotlight

Mike Muller, CTO of ARM took us straight to the punch with his talk at the IoT Security Summit 2015. The ugly truth is that, despite your best efforts to engineer a secure system for IoT, if your products are successful you will be compromised. Tech providers have to think very carefully about how attackers might break into their systems, they have to consider the entire attack surface and ensure security is architected in, and this needs to happen from manufacture right through to end of life. The bad news is that a hacker only needs to find one exploit and all that could be undone.

resources