The Role of Static Analysis in Assessing Trustworthiness of IIoT Software

In a previous post I introduced the Industrial Internet Consortium (IIC), the reference architecture and the concepts of...

Getting a GRASP on Security and Privacy of Mobile Apps

INTRODUCTION:

The recent controversy surrounding the Strava fitness app has illustrated a critical security problem....

An Update From IoT World 2017

The first two days at IoT World have been a blast. The audience is dynamite and keeping us on our toes for the entire time. We...

Homeland Security Issues Guidance on IoT Security

INTRODUCTION:

The Department of Homeland Security (DHS) published its recent IoT security guidelines after many months of...

VDC finds IoT fueling faster software development but with greater requirements for security protection

INTRODUCTION:

VDC’s recent report “Software Assembly Practices Necessitate More Precautions” highlights a significant software...