embedded

2 articles

Let’s Talk About Securing the Device

By AJ Shipley In my previous blog post, I touched on the key variables influencing how we approach device security.  In this blog post, I’ll focus the discussion on securing the device.  Before I do, I want to touch briefly on what was a key take away for me from last month’s RSA conference in San Francisco.  This year, the…

The Embedded Security Paradox

By Bill Graham For embedded systems developers, there exists a paradox in that security for the device is a high priority or "must-have" capability but it’s at odds with market and business requirements for their device as this often lengthens development time. Not only that, the nature of embedded systems is changing to a highly networked interconnected environment that increases…