Roll your own vs. commercial, the great RTOS Security Framework Debate?

Security solutions for embedded devices are where RTOSes were in the 1980s.  A few commercial solutions have started to appear on the market and customers are left with the choice of rolling their own solution or adopting a commercial solution. 

Early on, many companies rolled their own RTOS.  Over time, this gradually changed with commercial RTOSes becoming a larger and larger percentage of the market.  Eventually, quality open-source solutions became available, providing yet another option for developers.

Security for the Smart Home – Who is Responsible?

As smart home technology moves from the lab to the marketplace, many home security, surveillance and control functions will now be exposed to the Internet through Smart Home gateways and management systems.  Are these systems ready for the cyber-attacks that will undoubtedly ensue?  And who is responsible for ensuring these devices are safe from attack?

The security challenge for the smart home, with its network of specialized, connected devices is different than the security challenges for enterprise networks and PC systems.

Security Requirements for Embedded Devices – What is Really Needed?

Recently there have been a number of well documented attacks on embedded devices ranging from hacked vehicle anti-theft and control systems to hijacked printers that sent copies of documents to the hacker’s computer.  Many embedded devices include password protected logins and encrypted protocols such as SSH or SSL, but this is not sufficient.  If these methods were enough, we would not be reading about security breaches in the media.

Pages