News Articles

Security in a Data-Driven World

M2M (machine-to-machine) technology is making gains every day, and to sustain this growth, many in the industry are thinking proactively about how to protect our data, our devices, and our systems. In fact, it’s safe to say privacy and security are never far from our minds in a connected world.

Just this week, a news story broke about how several iterations of connected videoconferencing equipment can be pretty easily hacked, potentially opening up private meetings to the eyes and ears of the world. This kind of revelation makes consumers’ skin crawl.

Even our nation’s lawmakers recognize the public’s squeamishness regarding personal data and how it’s being used. Earlier this week, the U.S. Supreme Court ruled against the use of GPS devices to track citizens without first obtaining a search warrant.

On The Peggy Smedley Show,, an Internet radio show that covers M2M and connected devices, Tom Thomassen, senior manager of development, Office of the CTO, Symantec,, talked to host Peggy Smedley about the importance of addressing the challenges of securing end-to-end networks in both consumer and enterprise applications. In essence, he says, security is crucial to inspiring confidence in a connected world.

Through its security, storage, and systems-management solutions, Symantec hopes to help its customers keep a handle on their increasing number of end points in such a data-driven world. The company’s STAR (Security Technology and Response) division—made up of security engineers, virus hunters, threat analysts, and researchers—keep a vigilant eye on what Symantec calls the “Internet security threat landscape.”

Meanwhile, Wind River,, a wholly owned subsidiary of Intel Corp.,, has partnered with Coverity,, which offers a suite of products for development testing, to build security into the M2M development process.

By integrating Coverity’s development testing platform for security with Wind River’s embedded software, the companies hope to provide a solution that can address security vulnerabilities very early on in the process as software applications are being developed.

Making security a priority at an early development stage can reduce the risk of a data-security breach later on in a solution’s lifecycle. Because more and more devices now have embedded connectivity—from healthcare products to in-vehicle systems—the issue of data security is more important than ever.

“Increased security threats and continued growth of embedded device connectivity create an urgent need to address security during development,” says Wind River’s Marc Brown. Part of the solution, as Brown suggests, may be to identify and tackle potential security flaws before they become an issue.
• Cleve Adams Addresses Black Hat Conference
• BlackBerry Acquisition to Strengthen Security Leadership
• HWTrek’s Hub Brings Projects to Completion
• Utimaco Unveils Security Modules, Milestones
• A Look at the Future of RFID
• Sprint LivePro Makes Business Easier
• Philips Report Shows State of Innovation
• The Value of Trust for Utilities
• Growth for Cellular Connections in the Car
• Enabling Big Data and Connected Cars
• ORBCOMM Expands Territories
• Nest, Dropcam to Advance Smart Home
News Analysis:
Cleve Adams Addresses Black Hat Conference
BlackBerry Acquisition to Strengthen Security Leadership
HWTrek’s Hub Brings Projects to Completion
Utimaco Unveils Security Modules, Milestones
A Look at the Future of RFID
Press Releases:
Bosch® and State Farm® Partner with Plug and Play Internet of Things Accelerator
noHold Joins the LANDESK One Partner Program to Create the Next Generation Help Desk
ERP Expert, Rick Backus, Partners with MWA Intelligence, Inc.
17V, Synchronous Step-Down Regulator Delivers Dual 1A Outputs & Requires Only 5µA of Quiescent Current
B&B Electronics Launches the Wzzard Intelligent Sensing Platform to Accelerate Development of Smart, Power-Efficient IoT Applications
Partnering for Smarter Appliances
Telematics: A Transformative Economic Catalyst
Using the Network for Updating
Reducing the Risk with M2M
M2M Legislative Update