Login   |   1.866.392.4897 |   sales@timesys.com        English Japanese German French Korean Chinese (Simplified) Chinese (Traditional)
Build it fast, and build it secure: see the latest at Embedded World

Build it fast, and build it secure: see the latest at Embedded World

The world of embedded systems has gone through a massive transformation in recent years.

The rise of smart devices, the Internet of Things, mobile computing platforms, connected devices and a range of other innovations have driven embedded system deployments through the roof. Industry observers estimate IoT deployments alone account for 23 billion device deployments in 2018, up from 15 million in 2015. And that number is projected to triple in the next six years.

The explosion in demand has had a major impact on the makers of embedded systems and the products containing them.

Continue reading “Build it fast, and build it secure: see the latest at Embedded World” »

Tracking and Maintaining the Security of Embedded Systems

Tracking and Maintaining the Security of Embedded Systems

The deployment modes and functionality of embedded systems have evolved rapidly in recent years, thanks to widespread connectivity of Internet of Things devices and associated systems.

Yet the common security practices for most embedded systems remain largely unchanged from the days when they were isolated, air-gapped systems.

The shortfall in embedded system security is leading to sharply escalating risk of cyberbreaches. The trend is leading industry experts to advise embedded system developers to make security a top priority in design practices and product development.

Continue reading “Tracking and Maintaining the Security of Embedded Systems” »

The Risks of a ‘Stale, Abandoned’ Product

The Risks of a ‘Stale, Abandoned’ Product

Some product management decisions are hard. Product managers are constantly weighing trade-offs among time-to-market, functionality, competitive differentiation, development costs and other factors.

But some product decisions seem like no-brainers. Would you bring an IT product to market that puts customers at significantly increased risk of security breaches, privacy violations, potentially massive fines, and lawsuits?

“Of course not. That would be lunacy,” you can imagine the typical product manager as saying. Yet companies are shipping products every day that introduce this sort of risk into customer environments.

Continue reading “The Risks of a ‘Stale, Abandoned’ Product” »

‘Be Secure or Be Fined’ … 2018’s major milestones in IoT and embedded system security

‘Be Secure or Be Fined’ … 2018’s major milestones in IoT and embedded system security

As 2018 draws to a close, we’ve seen a landmark year in cybersecurity for embedded systems and the Internet of Things (IoT), marked by escalating threats, new regulation, and broader attacks.

Here’s a look back at three important IT security milestones in 2018 and a look forward with some predictions for 2019 and beyond.

Continue reading “‘Be Secure or Be Fined’ … 2018’s major milestones in IoT and embedded system security” »