Security
Mitigating M2M Security Risks in Critical Embedded Systems
Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates. However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack. Join this webinar to learn about common Attacks, threats and security considerations for embedded software. We'll also discuss using static analysis, Application Whitelisting, and much more. Event Date: Wednesday July 17, 2013 -- Time: 11:00 AM PT / 2:00 PM ETRelated Reading
More Insights
INFO-LINK
To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. | |