datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register | Benefits

Mitigating M2M Security Risks in Embedded Systems

Posted on: Sep 23, 2013 | Duration:
Course | 60 views
0 0
More Info +- Less Info

Overview:

Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates. However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack. 

Join this webinar to learn about:

  • Common attacks, threats and security considerations for embedded software
  • Using static analysis to find and fix security vulnerabilities  
  • Application whitelisting – preventing malware and unauthorized changes
  • Employing threat modeling as a defensive measure against security threats

Presenters:

  • Ed Adams, CEO, Security Innovation
  • Gwyn Fisher, CTO, Klocwork
  • Paul Paget, CEO, Savant Protection

0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page