I recently got a US patent application granted by the US Patent and Trademark Office. The patent bears the title “System, Device, and Method of Managing Trustworthiness of Electronic Devices”.Continue reading "My new patent on device trustworthiness measurement"
On July 12th, I was interviewed on Security challenges of organizations deploying IoT. The recorded (and transcribed) video interview can be found here. For those who prefer a written abstract, here is the outline of what I said in reply to a short set of questions about the security challenges with IoT deployment, and the approach followed at Pelion to overcome them.Continue reading "An interview on security challenges of organizations deploying IoT"
I will be speaking at the GSA Israel Executive Forum on October 14,2015.
The keynote I will deliver is titled: “Security: the Key Challenge to IoT Adoption”.
For more information visit the event website.
Added on 2015-10-15: You can find the keynote slide-deck attached to this post.
Discretix Technologies, a.k.a., Sansa Security, was acquired by ARM, as was now announced. I have been working with Discretix since its day of establishment, 15 years ago. I have been serving as its CTO and as the head of its CTO Office since January 2012.
Discretix is a pure-play security provider in the embedded domain. Over the years it has migrated from producing hardware-only crypto solutions to producing hardware and software solutions for content protection, to providing a client-server solution for provisioning, and finally to launching a provisioning service and operation. Sticking with this company throughout those changes easily counts as one of the most special experiences in my career.
Today I attended CyberDay 2015, where I delivered a lecture titled “Challenges in Securing IoT”.
Some of the lecture was devoted to discussing the issues mentioned in this post. Other issues were discussed as well.
I will be speaking in the ARM Security Seminar in Taipei, Taiwan. The title of the talk is “Future proofing your security architecture”.
Following is the talk abstract:
Today it is ten years since the first post on this blog was published. This blog superseded an email bulletin that I maintained for seven years beforehand.
I am not the best blogger ever. I write much less frequently than I planned and wanted. Writing takes time that I do not always have; but more importantly, I try not to write unless I have something unique to say, and by doing this I feel I differentiate this blog from hundreds of others.Continue reading "My blog's 10th anniversary"
I was quoted by The Enquirer saying that we shall all assume that data (from wearables and otherwise) that is collected by service providers will never be deleted. The data collected by wearables is only as protected as the network that holds it – and it is likely to be stored indefinitely.
“The trend today, given the ever-decreasing cost of storage, is to store data forever. A CIO will prefer to pay a bit more for a little more disk space than risk his job and company prosperity by deciding to discard data that is one day determined to have been useful.”
EDITED TO ADD: This story was also pubished by USA Today, and others.
An article and interview with me by Byron Acohido of ThirdCertainty about why surveillance cams are trivial to hack. The discussion also covers the stance of IoT security in general.
I recently got a US patent application granted by the Patent and Trademark Office. The patent bears the title “Methods Circuits Devices and Systems for Provisioning of Cryptographic Data to One or More Electronic Devices“.Continue reading "My new patent on secure key provisioning"