Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates.However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack.Learn about:
Common attacks, threats and security considerations for embedded software
Using static analysis to find and fix security vulnerabilities
Application whitelisting – preventing malware and unauthorized changes
Employing threat modeling as a defensive measure against security threatsPresented by:
Gwyn Fisher, CTO, Klocwork
Edward Adams, CEO, Security Innovation
Paul Paget, CEO, Savant Protection
Learn More