In 2016, the Industrial Internet Consortium gained agreement upon an understanding of the term “trustworthiness” and its effect on design and operation of an industrial system. At the core of that und more
In our daily lives, how frequently have we heard someone say “let’s make sure we are on the same page”, whether it be during a personal interaction or a business communication? Pretty often I would sa more
Trustworthiness, and confidence in that trustworthiness, are essential aspects of cyber-physical systems. Inattention to trustworthiness can lead to loss of human life, long-term environmental impacts more
In the Fall 2018 issue of the Industry IoT Consortium (IIC)’s Journal of Innovation, I published an article on Trustworthiness in Industrial System Design . The article introduced trustworthiness as a more
“Advancing progress toward a technology environment where all software products are safe and secure by design is a top priority for the U.S. Cybersecurity & Infrastructure Security Agency (CISA), the more
Supervisory control and data acquisition systems (SCADA) came into play in the 1970’s with the emergence of microprocessors and PLCs as mechanisms to control and monitor automated processes. In the ea more
I recently came across a blog post written in 2014 that today seems quite prophetic. Entitled “ Back to the Future: Is Electronic Software Delivery Making a Big Return? ,” the article was posted by Ja more
Your software business is booming but what happens when unexpectedly your customer’s business spirals out of control? Consider this hypothetical situation: An ISV has developed a software solution tha more
Certificates are used to prove the authenticity and identity of users or devices on the Internet, in emails, for machine-to-machine communication, and elsewhere. A commonly used certificate is an X.50 more
Subscription software licensing is gaining traction in nearly every business sector from e-commerce models to enterprise business applications to niche vertical software solutions. In IDC’s Worldwide more
By now, many of you have heard about the "BadUSB" exploit, where two security researchers at Security Research Labs demonstrated how they could perpetrate an attack on USB devices. By reprogramming th more
During the early 2000's, there was much skepticism about the value and viability of virtualization. Today, however, there is no doubt that companies have embraced the efficiencies and expansion capabi more
The U.S. Federal Trade Commission recently released an in-depth report entitled, The Internet of Things: Privacy & Security in a Connected World , which included a long list of considerations and reco more
In their book, Embedded Systems Security , David and Michael Kleidermacher point out some all-to-real scenarios about the consequences of malicious threats to embedded systems. Consider that for every more
Adobe may have raised some eyebrows last year when they announced they were moving their packaged Creative Suite PC software to the cloud, but most industry analysts predicted this day was coming – it more
Faced with an increasingly complicated network environment, made only more complex by the addition of virtualization, cloud services and bring your own devices (BYOD), many of your customers are also more
Dongles – The Historical "Bad Rap" When describing software protection dongles in a 2007 article appearing in PC Magazine , John C. Dvorak, a well-respected (but self-described curmudgeon) and award w more
We talk a lot about copy protection in this space but what I want to focus on today is what is meant by the phrase "secure software licensing." Let's unpack the term and look at each component separat more
Anytime you add a 3rd party component into your overall product stack you need to be thoughtful before you decide. Copy protection software is no different: it's something you will rely on to protect more
Hackers are out there. So you can't take for granted--now or ever--that it won't happen to you. Achieving software security is a complex problem; what's amazing to me is how often the bad guys get in more
Cet écran réduit la consommation d'énergie du moniteur lorsque vous n'êtes pas actif sur notre site. Pour reprendre la navigation, il suffit de déplacer votre souris.