Company / News

Security is not a bolt-on feature, it needs to be built into your IoT and wearable devices

Security is not a bolt-on feature, it needs to be built into your IoT and wearable devices

Security can not be an afterthought for IoT and wearable devices, it must be designed in from the very beginning. It must be addressed in all phases of the project, including system design, test and validation.

Security tradeoffs and implementation will impact

  • Hardware requirements and power consumption
  • End-to-end connectivity
  • Testing and validation
Why is IoT different than traditional cybersecurity?
  • Hardware is often in uncontrolled locations
  • Limited processing power of end nodes

Security Resources

Here are some good resources on IoT security that highlight the importance of security and its difficulty in small embedded devices. We are familiar with resources such as these and can use them to design your product.

Lars Lydersen, Senior Director of Product Security at Silicon Labs, presents the different layers of security needed for IoT/wearable devices. He explores some of the most common security pitfalls in embedded applications.

intr-to

In “IoT Security: The Ugly Truth,” Mike Muller, CTO at ARM, shows that the knowledge and experience are readily available, but need to be adapted and equipped to effectively interact with the Internet of Things.

Secure Push provides a unique Signalwall technology for IoT devices.

Intrinsic ID also provides an interesting device authentication technology.

https://www.intrinsic-id.com/globalsign-intrinsic-id-webinar/

Wearable Medical

Wearable medical devices have additional requirements as outlined by the FDA. We have the knowledge to take care of compliance with FDA requirements.

 

Cybersecurity” https://www.fda.gov/MedicalDevices/DigitalHealth/ucm373213.htm

“Content of Premarket Submissions for Management of Cybersecurity in Medical Devices, FDA, 2 Oct 2014, https://www.fda.gov/ucm/groups/fdagov-public/@fdagov-meddev-gen/documents/document/ucm356190.pdf

Postmarket Management of Cybersecurity in Medical Devices, FDA, 28 Dec 2016, https://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm482022.pdf

Related News

Highly Successful Engineering Design Projects by...

Highly Successful Engineering Design Projects Keys to Staying on Budget,...

Advice for new engineering managers

If you recently stepped into the role from a developer...

Volume 2014, Issue 1 Newsletter

In This Issue: Mitigating Risk of Obsolete Electronic Components When...

Newsletter Sign Up
Chatbot
chat-icon
clse-1
Get Expert Consulting

Voler is really good at identifying risks and finding the best way to do a project on-time, on spec, and easy to manufacture.