The vulnerability of Internet-enabled endpoints in the Industrial Internet of Things (IIoT) is a critical security concern. The rapid proliferation of these connected devices, which include sensors, P more
A flexible software license management system is critical for enabling ISVs to keep pace with end user expectations, not only in the way the software is licensed, but also in the manner by which end u more
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints. In many cases, an attacker will try to access the execution code and attack the we more
The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware- based root of truste more
Late last year, the World Economic Forum’s Global Agenda Council on the Future of Software & Society issued a very interesting report on Deep Shift: 21 Ways Software Will Transform Global Society . In more
Understanding the Vulnerabilities of IIoT Endpoints Much has been written lately about IIoT endpoints and their many potential security vulnerabilities. As defined by the Industrial Internet Consortiu more
The Internet of Things (IoT) is a term that has slipped easily into our everyday vocabulary, bringing with it exotic notions of smart appliances, driverless automobiles, intelligent monitors, and the more
When I last googled Blockchain , 21 million results were returned, and I am sure this number is on the rise as government agendas, panels at international trade shows, and every vendor dealing in IT s more
It seems like every day we hear about damaging and costly cyberattacks resulting from pirated software, theft of digital Intellectual Property, stolen personal, financial and medical data, or maliciou more
U.S. Senators recently introduced legislation intended to improve the cybersecurity of Internet-connected devices. The Internet of Things (IoT) Cybersecurity Improvement Act of 2017 would require that more
On the 20 th and 21 st of September, the new "Secure Distributed Ledger and Contracts" Research Center was inaugurated by Prof. Sadeghi at the University of Darmstadt , Germany. In his role as externa more
Blockchain frameworks enable the immutable storage of data [1,2]. A still open practical question is the so called “oracle” problem, i.e. the way real world data is actually transferred into and out o more
“The next generation of software monetization is not just about IP protection nor limited to licensing alternatives (perpetual versus term), but rather about enabling business models that provide addi more
Cybercrime will cost up to $6 trillion by 2021, according to a report recently released by Cybersecurity Ventures . This colossal number is equivalent to nearly half of today’s US Gross Domestic Produ more
Pay-per-use software licensing is not a new concept. In fact, as discovered in a recent Google search, the business model was under consideration as far back as 1993 ( Host Users Seek License Details, more
“The system should not require secrecy and it must not be a problem if it falls into enemy hands.” Those were the words of Auguste Kerckhoffs, who published two articles in 1883 in which he surveyed t more
Employing a features-on-demand licensing strategy has significant advantages for developers as well as end users. In many instances, the full capabilities of a particular software program are rarely u more
Here at Wibu-Systems, we spend much of our time speaking with customers and evangelizing at industry meetings and conferences regarding the importance of protecting software and intellectual property more
“In an eye-opening embedded systems safety and security survey conducted by the Barr Group , 28 percent of respondents said the systems they work on could cause injury or fatalities and 60 percent of more
If you are a history buff, you might find this post interesting. If you are a history buff with interest in cryptography and software hacking, you may have a lot of fun with it. First the history. In more