Skip navigation
483147081.jpg
EditorsChoice-Security-promo-with-EC2.jpg

Embedded Security

This collection of articles addresses different aspects of embedded security that should interest developers and programmers.

Here's a collection of articles that address different security issues.

Why Companies Fail to Learn from Peers' Mistakes (and How They Can Change) comes to us from Dark Reading, another Informa website. The article addresses “why companies are reluctant to learn from their peers' mistakes and what they can do to avoid similar fates.” It includes over half a dozen steps that can help prevent data breaches. It targets cloud users but is equally applicable to embedded designs.

Dark Reading

1. Why Companies Fail to Learn from Peers' Mistakes (and How They Can Change) comes to us from Dark Reading.

Keeping Hackers Out of Connected Cars is found on Design News. " Traditional IT security mechanisms for updates, patches, and protection do not apply to automotive, and the industry is scrambling to catch up with the fast pace of innovation and find a security approach that will prevent attacks, save lives, protect personal data, protect vehicle behavior as designed, and reduce recalls.”

2. Keeping Hackers Out of Connected Cars on Design News addresses ECU hack prevention (image source: Wikimedia Commons).

Seventy percent of healthcare organizations will have invested in blockchain technology by 2025. Machine Design’s article, "Blockchain How Blockchain Can be Used to Improve Healthcare," examines where blockchain is being used in the healthcare industry.

Blockchain

3. Machine Design provided this article on Blockchain How Blockchain Can be Used to Improve Healthcare.

5G will be integral to many IoT solutions and security is a key aspect of any product design. The Black Hat conference addresses security concerns and one of its sessions addressed 5G security issues. Black Hat 2019: The Promise of 5G Also Brings Security Concerns highlights that session and the security issues it addressed. The article is on the ITProToday website.

We wrap up with Crypto Essentials. This article is an overview of public key security here on the Electronic Design website. Public key infrastructures (PKI) are built on this technology. They're also used in security technology such as blockchains.  

4. Crypto Essentials is an overview of public key security on Electronic Design.