LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com
Laying down the law on IoT security

Laying down the law on IoT security

IoT device security vaulted into the public consciousness in recent years. Media coverage of successful attacks against IoT devices and supporting systems, botnets powered by compromised devices, and a range of other security issues have raised public concern.

But now California is on the verge of enacting the first actual law in the US to mandate IoT device security.

Unfortunately, according to some in the industry, the bill now awaiting the governor’s signature will do little in its present form to improve the security of IoT, or the companies deploying it, or the people using it.

Continue reading “Laying down the law on IoT security” »

Security at IoT scale

Security at IoT scale

It often helps to look at cybersecurity from the attacker’s point of view.

This approach, in fact, is the foundation of common techniques for penetration testing. That’s when “white hat” hackers will put a company’s IT systems through a range of attacks, looking for security vulnerability issues and defense gaps.

So when we consider Internet of Things device security and the defenses that protect an enterprise’s IoT deployments, it’s important to adopt the mindset of an attacker.

What’s an attacker looking for when they are prepping IoT attacks?

Continue reading “Security at IoT scale” »

‘Complexity is the enemy of security’ … especially in IoT

‘Complexity is the enemy of security’ … especially in IoT

There is an old saying in the IT security space, one that applies really across any type of security: Complexity is the enemy of security.

It’s hard to pin down exactly who coined this phrase. Among the earliest references to it are from IT security guru Bruce Schneier. And Schneier’s discussion of this principle is probably among the clearest: systems get harder to secure as they get more complex. And since our systems are getting more complex all the time, security is becoming more challenging.

Today’s poster child for the Complexity-Security inverse correlation is Internet of Things device security.

Continue reading “‘Complexity is the enemy of security’ … especially in IoT” »

Secure boot on Snapdragon 410

Secure boot on Snapdragon 410

Qualcomm Snapdragon processors support secure boot which ensures only authenticated software runs on the device. By configuring the processor for secure boot, unauthorized or modified code is prevented from being run. The authenticity of the image is verified by use digital signatures and certificate chain.

Secure Boot process overview

On Qualcomm processors the first piece of software that runs is called Primary BootLoader (PBL) and it resides in immutable read-only-memory (ROM) of the processor. By configuring the processor for secure boot, PBL can verify the authenticity of the Secondary BootLoader (SBL) before executing it. Continue reading “Secure boot on Snapdragon 410” »

IoT Security: Don’t Ship Product Without It

IoT Security: Don’t Ship Product Without It

Devices connected via IoT technology are spreading across multiple industries at unprecedented rates. But the benefits of enhanced connectivity are accompanied by increased security risks.

IoT technology is used in everything from healthcare devices, to transportation infrastructure, to industrial control systems supporting operationally critical processes.

According to Forbes, some 80 billion devices will be connected to the internet by the year 2025. In terms of customer convenience and effective performance, this trend could be game-changing for people who rely on technology to explore, work, and live.

Continue reading “IoT Security: Don’t Ship Product Without It” »

The FBI Warns of IoT Security Issues Once Again

The FBI Warns of IoT Security Issues Once Again

The US Federal Bureau of Investigation has issued a warning about Internet of Things device security issues, the latest in a continuing string of IoT attack and security vulnerability warnings from the US’s top law enforcement agency.

Attackers are using compromised IoT devices as proxies to mask various illicit activities, the FBI said, citing spamming, click-fraud, illegal trade, botnets for hire, and other crimes being committed using IoT devices.

The Bureau said IoT device vulnerabilities are being exploited by these attackers, naming routers, media streaming devices, Raspberry Pis, IP cameras, network attached storage (NAS) devices as among the types of products covered by the warning.

Continue reading “The FBI Warns of IoT Security Issues Once Again” »

Why is traditional IT security failing to protect the IoT?

Why is traditional IT security failing to protect the IoT?

The traditional IT security architecture has been through a mammoth, global stress test in recent years thanks to the environment of escalating attacks and huge data breaches.

But perhaps the biggest challenge of all to the traditional IT security architecture has been in the IT evolution driven by the Internet of Things (IoT), Cloud Computing, Edge Computing and related innovations.

Continue reading “Why is traditional IT security failing to protect the IoT?” »

Why choose TimeStorm IDE over standard Eclipse for embedded Linux development?

Why choose TimeStorm IDE over standard Eclipse for embedded Linux development?

As the product manager for TimeStorm, I am often asked the following two questions about TimeStorm, our Integrated Development Environment (IDE):

  1. Why would I need an integrated development environment?
  2. What can I do with TimeStorm that I can not do using Eclipse with available open source plugins?

Continue reading “Why choose TimeStorm IDE over standard Eclipse for embedded Linux development?” »

Make your device’s security posture stronger

Make your device’s security posture stronger

If you make devices that support enterprise operational tasks, sensor data gathering, or a range of other enterprise processes, then your device’s security posture is a major concern for your customers.

But if you are not in the IT security industry, the security posture for your device may not even be something that is clearly defined in product requirements. Besides the obvious security-oriented features, such as encryption and authentication and compliance-mandated features, security requirements are often embedded in a host of other functions and processes that may be covered by your device requirements.

Continue reading “Make your device’s security posture stronger” »

Maintaining strong security for your IoT device BSP

Maintaining strong security for your IoT device BSP

IT security has never been more of a hot button topic than it is today. Increasingly, the focus is on the security of the Internet of Things (IoT) and the embedded systems that support these devices.

And so far, the traditional enterprise security architectures and procedures are failing to protect these systems from being compromised. The evidence is trumpeted in the headlines documenting successful compromises, emerging breach patterns, and the exploding volume of vulnerability advisories.

Continue reading “Maintaining strong security for your IoT device BSP” »