News Articles

Security in a Data-Driven World

M2M (machine-to-machine) technology is making gains every day, and to sustain this growth, many in the industry are thinking proactively about how to protect our data, our devices, and our systems. In fact, it’s safe to say privacy and security are never far from our minds in a connected world.

Just this week, a news story broke about how several iterations of connected videoconferencing equipment can be pretty easily hacked, potentially opening up private meetings to the eyes and ears of the world. This kind of revelation makes consumers’ skin crawl.

Even our nation’s lawmakers recognize the public’s squeamishness regarding personal data and how it’s being used. Earlier this week, the U.S. Supreme Court ruled against the use of GPS devices to track citizens without first obtaining a search warrant.

On The Peggy Smedley Show,, an Internet radio show that covers M2M and connected devices, Tom Thomassen, senior manager of development, Office of the CTO, Symantec,, talked to host Peggy Smedley about the importance of addressing the challenges of securing end-to-end networks in both consumer and enterprise applications. In essence, he says, security is crucial to inspiring confidence in a connected world.

Through its security, storage, and systems-management solutions, Symantec hopes to help its customers keep a handle on their increasing number of end points in such a data-driven world. The company’s STAR (Security Technology and Response) division—made up of security engineers, virus hunters, threat analysts, and researchers—keep a vigilant eye on what Symantec calls the “Internet security threat landscape.”

Meanwhile, Wind River,, a wholly owned subsidiary of Intel Corp.,, has partnered with Coverity,, which offers a suite of products for development testing, to build security into the M2M development process.

By integrating Coverity’s development testing platform for security with Wind River’s embedded software, the companies hope to provide a solution that can address security vulnerabilities very early on in the process as software applications are being developed.

Making security a priority at an early development stage can reduce the risk of a data-security breach later on in a solution’s lifecycle. Because more and more devices now have embedded connectivity—from healthcare products to in-vehicle systems—the issue of data security is more important than ever.

“Increased security threats and continued growth of embedded device connectivity create an urgent need to address security during development,” says Wind River’s Marc Brown. Part of the solution, as Brown suggests, may be to identify and tackle potential security flaws before they become an issue.
• GE Envisions Smart Kitchens
• Updating Mobile Devices
• Accenture Teams up with Uconnect
• WhiteSpace Alliance® Develops Interoperability Specification for Wi-FAR™ Networks
• GreenPeak Technologies’ Smart Home chips support new networking protocols like Thread
• SAP Commits to Cloud Foundry and OpenStack for Innovative Development in the Cloud
• Home Medical Monitoring Surges
• New Solution Helps Monitor Sleep Apnea
• Stay Cool with Connected AC Solution
• The Future of Mobile Operating Systems
• No More Overage Charges Overseas
• Forecaster Tackles Security Issues in M2M/IoT
News Analysis:
GE Envisions Smart Kitchens
Updating Mobile Devices
Accenture Teams up with Uconnect
Home Medical Monitoring Surges
New Solution Helps Monitor Sleep Apnea
Press Releases:
WhiteSpace Alliance® Develops Interoperability Specification for Wi-FAR™ Networks
GreenPeak Technologies’ Smart Home chips support new networking protocols like Thread
SAP Commits to Cloud Foundry and OpenStack for Innovative Development in the Cloud
Thinfilm and EVRYTHNG Collaborate to Apply Digital Interactivity to Physical Objects
Partnering for Smarter Appliances
Telematics: A Transformative Economic Catalyst
Using the Network for Updating
Reducing the Risk with M2M
M2M Legislative Update