Wednesday July 17, 2013
Time: 11:00 AM PT / 2:00 PM ET
Duration: 60 minutes
[click here to register]
An Dr. Dobbs Webcast
Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates.
However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack.
Join this webinar to learn about common Attacks, threats and security considerations for embedded software. We'll also discuss using static analysis, Application Whitelisting, and much more.
Edward Adams: — Chief Executive Officer, Security Innovation
Paul Paget: — Chief Executive Officer, Savant Protection
Gwyn Fisher: — Chief Technology Officer, Klocwork