LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com    |  Contact Us          
Who is attacking IoT? What do they want?

Who is attacking IoT? What do they want?

The motivation of hackers sometimes can be plain as day. Other times, not so much.

As attacks on Internet of Things (IoT) devices and deployments escalate, it is important to understand what these attackers are trying to accomplish. Understanding these motives, after all, can help us to pinpoint why a security vulnerability represents a risk, to prioritize mitigation and defenses, and to focus responses to attacks.

Continue reading “Who is attacking IoT? What do they want?” »

New IDE version produces shorter time-to-market for secure IoT devices and embedded Linux applications

New IDE version produces shorter time-to-market for secure IoT devices and embedded Linux applications

This week we announced a new release of our TimeStorm Integrated Development Environment (IDE). TimeStorm 5.3.2 IDE is designed to streamline, simplify and accelerate the development of secure Internet of Things (IoT) and embedded Linux applications.

In an era of heightened awareness of embedded software security and device security risks, product developers need to be able to adopt security best practices without delaying the development and release of new products.

Continue reading “New IDE version produces shorter time-to-market for secure IoT devices and embedded Linux applications” »

Progress toward IoT security … a little less conversation, a little more action please

Progress toward IoT security … a little less conversation, a little more action please

Research, reporting and commentary about Internet of Things security has made a flurry of technology headlines over the past several years. And industry observers are commenting that IoT security may finally be gaining the attention it deserves among technology decision makers.

So will 2019 be a milestone year for IoT security?

Or will more IoT security failures lead to more industry regulation, more vendor criticism and more conversation, not enough action?

Continue reading “Progress toward IoT security … a little less conversation, a little more action please” »

‘Be Secure or Be Fined’ … 2018’s major milestones in IoT and embedded system security

‘Be Secure or Be Fined’ … 2018’s major milestones in IoT and embedded system security

As 2018 draws to a close, we’ve seen a landmark year in cybersecurity for embedded systems and the Internet of Things (IoT), marked by escalating threats, new regulation, and broader attacks.

Here’s a look back at three important IT security milestones in 2018 and a look forward with some predictions for 2019 and beyond.

Continue reading “‘Be Secure or Be Fined’ … 2018’s major milestones in IoT and embedded system security” »

Another Record Year for Vulnerabilities … Time to Join the CIA?

Another Record Year for Vulnerabilities … Time to Join the CIA?

This blog post is published in full as a guest post on Embedded Computing Design.

In mid-November, the total count of vulnerabilities reported in 2018 surpassed the total for 2017, setting a new record for vulnerabilities with six weeks left in the calendar year.

At this pace, we are on track to see the count of Common Vulnerabilities & Exposures (CVEs), the authoritative index of confirmed IT system vulnerabilities, reach 16,000 or more vulnerabilities for this year, according to tracking site CVE Details.

Continue reading “Another Record Year for Vulnerabilities … Time to Join the CIA?” »

Ready to tackle embedded Linux MPU development with Windows … Do you know your options?

Ready to tackle embedded Linux MPU development with Windows … Do you know your options?

Have you been developing embedded devices for years? Are you considering building your first operating system based product and looking at using embedded Linux? You are not alone.

Many companies that have historically been developing MCU based products are now being pushed by market and customer requirements to offer better, more feature-rich and more capable devices. In order to deliver the desired features, many new designs require a combination of MCUs and MPUs. Both of these are used in IoT systems to support cloud, gateway to edge functionality.

Continue reading “Ready to tackle embedded Linux MPU development with Windows … Do you know your options?” »

Can products be developed quickly and be secure at the same time?

Can products be developed quickly and be secure at the same time?

It’s perhaps the longest standing myth in IT:

You can deploy IT quickly, or you can deploy it securely. But you can’t do both.

This supposed trade-off touches virtually every aspect of IT, from product development, to market release, to customer deployment, production product maintenance, and all associated stages.

Continue reading “Can products be developed quickly and be secure at the same time?” »

The new focus on ‘Security by Design’

The new focus on ‘Security by Design’

As the flood of vulnerabilities continues to rise, attention is turning to how embedded system products can be made more secure.

Almost 20 years ago, the concept of security by design was a popular new trend in software development. The focus on baking in security at product design stages was driven by the massive rise in on-line applications, e-commerce features and other Internet-connected, web-enabled software.

As these systems and applications were deployed and became widespread, the expanding attack surface made them attractive targets for attackers looking to steal user information and financial data. So naturally the industry’s response was to rethink and reinvent security in the new threat environment. That meant defining best practices for creating more secure applications at the design stage.

Continue reading “The new focus on ‘Security by Design’” »

Vulnerabilities keep piling up … time to make security a product differentiator?

Vulnerabilities keep piling up … time to make security a product differentiator?

Is your product the “Volvo” of embedded system products? For decades, carmaker Volvo has been known as a maker of safe vehicles.

While all makes of cars are generally much safer than in decades past, and some observers rank some other brands’ models higher in safety, there is no dispute that Volvo has made safety a cornerstone of its brand. Like other car brands have focused on qualities like luxury, reliability or the driving experience, Volvo has emphasized safety as a chief value of its products.

Perhaps soon we will see a Volvo-style strategy emerging from the makers of embedded system devices and the Internet of Things (IoT). In fact, with the volume of security vulnerabilities reaching an all-time high, there’s a prime opportunity for a device maker to become known market-wide as a “security first” product developer whose customers are more protected from cyberattack.

Continue reading “Vulnerabilities keep piling up … time to make security a product differentiator?” »

Another record year in vulnerabilities as the CVE storm continues

Another record year in vulnerabilities as the CVE storm continues

The vulnerability storm continues unabated.

The count of security vulnerabilities has reached another annual record, with six weeks remaining in the calendar year. This week the number of Common Vulnerabilities and Exposures (CVEs) hit 14,722, eclipsing last year’s total of 14,714, according to the tracking totals at CVE Details.

Continue reading “Another record year in vulnerabilities as the CVE storm continues” »