Security and the IoT are terms becoming intrinsically linked in the grand discussion of connected devices and their envisioned applications in virtually every aspect of our ecosystem, whether it be co more
The US FDA recently published new recommendations for both manufacturers and regulators to address medical device cybersecurity. The final document, Postmarket Management of Cybersecurity in Medical D more
The push for some form of liability for vendors who sell faulty or insecure software has been the subject of debate for many years with little or no clear agreement on its legality or how to enforce i more
The tone of the many well-meaning discussions about the Industrial Internet of Things (IIoT) varies widely from one viewpoint of unbridled optimism about the seemingly endless possibilities to another more
The vulnerability of Internet-enabled endpoints in the Industrial Internet of Things (IIoT) is a critical security concern. The rapid proliferation of these connected devices, which include sensors, P more
Software licensing and monetization continue to be critical factors in a successful deployment for ISVs, particularly as the IoT and embedded systems market evolves and end user licensing preferences more
Whether you are a total believer or not, it looks like the shift from perpetual software licensing to the software subscription model is here to stay. According to a Gartner report , “By 2020, more th more
In the past decade, the Internet has dramatically changed the way software and the corresponding licenses are delivered. As we know, the days of the CD ROM installation are long gone. Consumers today more
Understanding the Vulnerabilities of IIoT Endpoints Much has been written lately about IIoT endpoints and their many potential security vulnerabilities. As defined by the Industrial Internet Consortiu more
The Internet of Things (IoT) is a term that has slipped easily into our everyday vocabulary, bringing with it exotic notions of smart appliances, driverless automobiles, intelligent monitors, and the more
When I last googled Blockchain , 21 million results were returned, and I am sure this number is on the rise as government agendas, panels at international trade shows, and every vendor dealing in IT s more
It seems like every day we hear about damaging and costly cyberattacks resulting from pirated software, theft of digital Intellectual Property, stolen personal, financial and medical data, or maliciou more
U.S. Senators recently introduced legislation intended to improve the cybersecurity of Internet-connected devices. The Internet of Things (IoT) Cybersecurity Improvement Act of 2017 would require that more
Blockchain frameworks enable the immutable storage of data [1,2]. A still open practical question is the so called “oracle” problem, i.e. the way real world data is actually transferred into and out o more
The recent news about security vulnerabilities in common microprocessors and, by implication, popular operating systems and applications have left many users rightly concerned about their IT security. more
“The system should not require secrecy and it must not be a problem if it falls into enemy hands.” Those were the words of Auguste Kerckhoffs, who published two articles in 1883 in which he surveyed t more
Employing a features-on-demand licensing strategy has significant advantages for developers as well as end users. In many instances, the full capabilities of a particular software program are rarely u more
Here at Wibu-Systems, we spend much of our time speaking with customers and evangelizing at industry meetings and conferences regarding the importance of protecting software and intellectual property more
“In an eye-opening embedded systems safety and security survey conducted by the Barr Group , 28 percent of respondents said the systems they work on could cause injury or fatalities and 60 percent of more
If you are a history buff, you might find this post interesting. If you are a history buff with interest in cryptography and software hacking, you may have a lot of fun with it. First the history. In more