device security

3 articles

Let’s Talk About Securing the Device

By AJ Shipley In my previous blog post, I touched on the key variables influencing how we approach device security.  In this blog post, I’ll focus the discussion on securing the device.  Before I do, I want to touch briefly on what was a key take away for me from last month’s RSA conference in San Francisco.  This year, the…

Simplifying the Security Approach

By AJ Shipley As a security professional in the business of helping Wind River customers protect their systems from malicious intent I am frequently asked how they should approach security.   Here are my thoughts on a tried and true approach to security. At a very high level, you can approach security from one of two possible paths; you can secure…

Strengthening Security for Connected Medical Devices

By Santhosh Nair Three years ago an article in the New England Journal of Medicine reported that computer hackers could gain wireless access to implanted pacemakers and shut them off, or reprogram defibrillators to deliver fatal jolts of electricity. This generated an avalanche of press worldwide about the hidden risks of medical devices, followed by requisite hand-wringing from politicians and…