“Threat actors don’t have to defeat a company’s security measures, they only have to compromise a third-party supplier that it works with or relies on.” CSOonline That seems to be the case with a new more
BSA | The Software Alliance , a leading advocate for the global software industry, recently announced its U.S 2018 policy agenda . The agenda focuses on four main policy areas: data, intellectual prop more
The Fourth Industrial Revolution Is Here - Are You Ready? That’s the question posed to more than 1,600 C-level executives by Deloitte Global in a survey recently conducted by Forbes Insights. The rese more
Software has become ubiquitous in the healthcare industry given its widespread use for controlling medical devices and health information systems and communicating and maintaining electronic patient d more
The VDMA , the advocacy organization for Germany’s mechanical and systems engineering industry, has released data from its latest research on product piracy (Product Piracy 2018), and once again, the more
A recent article in SD Times gave light to the trend that more and more aspects of software development are being forced to “shift left” in the development lifecycle, meaning that the speed at which d more
"Bricking” is a widely used term describing an electronic device, such as a smartphone, game console, router, or tablet computer that has been rendered useless due to severe physical damage, a serious more
An article by Jacob Beningo that appeared recently in Design News caught my eye and raised an interesting question. The main premise of the article, “ The Soon-to-Be-Extinct Embedded Software Engineer more
The potential danger of cyberattacks is present in virtually every facet of our lives, whether it be tampering of medical devices, attacks on critical civil infrastructure, prying into our connected h more
Trade imbalance is at the crux of the harsh rhetoric exchanged between the U.S. and China recently as both sides threaten to implement tariffs on certain goods and imports to protect their own economi more
Historically, software developers have been free of liability if their software fails thanks to End User License Agreements that essentially grant them immunity from lawsuits. Over the years, U.S. cou more
As has been written in this space many times before, the risks to modern, connected industrial control systems are quite real, from loss of system control and destruction to stealing machine designs a more
Governments, industry organizations, and industrial leaders keep focusing their attention on cybersecurity in light of the advances driven by Industry 4.0 and Smart Manufacturing that continue to shap more
The right-to-repair movement is gaining traction in the U.S. as many states are considering legislation that would allow consumers and third parties to repair electronic equipment without voiding manu more
It’s been widely discussed over the past decade as to how artificial intelligence (AI) promises to transform virtually every segment of our economy by bringing human intelligence into computing and al more
For some ISVs, software licensing can be straightforward and uncomplicated. Their software is designed to only be implemented on a specific operating system and deployed over a particular type of netw more
In his syndicated Software Integrity Blog , Jonathan Knudsen of Synopsis, recently made a case for why software should be considered critical infrastructure. He points out that the U.S. recognizes 16 more
With its many promises and great prospects, the Internet of Things (IoT) warrants much stronger protection then the closed systems of the past. IoT systems rely on public networks, which by definition more
Digital transformation is changing the healthcare landscape as more and more medical devices come online, both next generation systems and legacy equipment, with many allowing remote access. Digital p more
The digital transformations occurring across all segments of society are unfolding at breakneck speed. From autonomous vehicles and smart cities to digitized healthcare delivery, all facets of our con more