Embedded Insiders: What Are the Table Stakes for IoT Security

By Perry Cohen

Associate Editor

Embedded Computing Design

July 17, 2020

Embedded Insiders: What Are the Table Stakes for IoT Security

In this edition of the Embedded Insiders, Brandon and Rich ponder when "enough is enough" in terms of IoT device security.

 
 

In this edition of the Embedded Insiders, Brandon and Rich ponder when “enough is enough” in terms of IoT device security. Because implementing robust security is so time consuming and expensive, why haven’t we just created development workflows that make it more costly to NOT use security?

Later, the Insiders are joined by Jeremy Boone, Technical Director of The NCC Group, security analysis firm. Together, the trio consider how flaws at all levels of the IoT solution stack can be exploited, as well as engineering best practices that can minimize these vulnerabilities. This boils down to CYA with CIA.

Finally, Jean Labrosse is back with more “Things That Annoy a Veteran Software Engineer” where he explains why it drives him nuts when a programmer over-uses asserts.

Perry Cohen, associate editor for Embedded Computing Design, is responsible for web content editing and creation, podcast production, and social media efforts. Perry has been published on both local and national news platforms including KTAR.com (Phoenix), ArizonaSports.com (Phoenix), AZFamily.com, Cronkite News, and MLB/MiLB among others. Perry received a BA in Journalism from the Walter Cronkite School of Journalism and Mass Communications at Arizona State university.

More from Perry