With 36 years of experience, Behshad Rejai, VP of engineering in the Software Integrity Group, shares her views of the future of software development.
Code quality and code security aren’t the same, but they’re closely related. And in the current cyberthreat environment, developers should care about both.
The challenges of video surveillance cybersecurity highlight some of the many issues that plague the use of connected devices in physical security systems.
Posted in IoT Security | Comments Off on The state of cybersecurity in the physical security industry
Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?
Posted in IoT Security | Comments Off on Feds seek to up their cybersecurity game
Cyber-physical attacks are on the rise. As the IoT creeps further into our daily lives, so does the attack surface. What can we do to keep ourselves safe?
Posted in IoT Security | Comments Off on The cyber-physical convergence is accelerating—and so are the risks
How to prevent IoT hacks: Secure your software before you release it. It’s not that hard. So why aren’t more IoT device manufacturers doing it?
Posted in IoT Security | Comments Off on The IoT: Still feature rich, security poor
The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.
The new California password law demonstrates lawmakers’ misunderstanding of how connected devices work, how the internet works, and even how passwords work.
The original version of this article was published in Forbes.
Posted in IoT Security | Comments Off on Make your home both smart and secure | NCSAM at Synopsys
The Internet of Things is now inside us. But network-connected medical devices are troubling, considering the history of medical device vulnerabilities.