The Role of Tools in Improving Embedded Software Security / Part 3: Mapping the Tools to Activities

By Bill Graham

Bill Graham

In the previous posts in this series, Part 1: Automation is the Key and Part 2: Security Improvement and the Software Development Lifecycle, I talked about the connection between the typical embedded device development process and the 5+1 improvement framework for embedded security.  Figure 1 is an illustration of this connection (and discussed in more detail in a previous post).

Tools image 1

Figure 1: Mapping the security improvement framework and the device software lifecycle

Continue reading >>

Previous Just minutes to a faster, smarter and more secure network
Next Poll Results are in...Network Intelligence Heading to Edge and Core