Lots of people are involved in security the Internet of Things (IoT). However, there seem to be almost as many people focusing on the other side, meaning that they’re trying to hack into your network. One of the questions I always have in this regard is, how do we stay ahead of the bad guys? [...]
A projector fired up in a moderately sized conference room at The Boulders Resort in Carefree, AZ on Monday, and from it appeared the image of a young man dressed in all black wearing rimless glasses. A day or two’s worth of stubble suggested fatigue although he was very much alert, and a green screen [...]
Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the explosion in the number of connected devices, security attacks can now be launched from anywhere, targeting any place. Wind River(r) has combined our solutions for commercial Android with experience in secure certified embedded systems to develop an advanced security strategy for Android platforms that also ensures compatibility with the commercial Android development model. Our comprehensive approach includes attack detection and prevention, device integrity, isolation techniques, and infrastructure security to protect data and devices from multiple threat vectors.