Mitigating M2M Security Risks in Critical Embedded Systems
Date – Thursday, December 12 at 1pm ET
Time - 12 at 1pm ET
Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless...
More
Mitigating M2M Security Risks in Critical Embedded Systems
Date – Thursday, December 12 at 1pm ET
Time - 12 at 1pm ET
Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless
management and updates. However, there are profound security implications as the software running therein must be completely
fault-tolerant and hardened from attack.
This webcast, delivered by three seasoned professionals in the application security and embedded space, will describe the inherent
security challenges of embedded systems, and provide best practices for protecting sensitive data. Embedded software engineers and
security specialists attending this webinar will learn about:
Common Attacks, Threats and Security Considerations for embedded software
Using static analysis to find and fix security vulnerabilities
Application Whitelisting – preventing malware and unauthorized changes
Employing threat modeling as a defensive measu
Less