And yes - semiconductor companies have to worry about this as well. How do they know that IP they purchase doesn't have backdoors in, or that a developer has not placed weakness in a design on purpose. Attacks from within again.
It is ironic that open source is not trusted when it has so many eyes looking at it, and yet they will trust internally developed software that could have people putting back doors in which would remain hidden.
@brianBailey, governement requires software of certain specifications, and often requests specific vendors. Many companies have policies in place blocking open source out of fear of back doors. There's a perceived lack of accountability or security on the creation side.
Certianly interested in a security seminar if you host it. As for open source in our company, it's a long road to get it in use if at all. Our biggest issue is the rate of mobile adoption and the willingness of people to wait until there's an issue instead of preventing issues.
OAuth is a data mining issue for social engineering. We struggle with it and even getting customers to see that true security does involve some level of inconvience. It's the same issue as getting people to use strong passwords.
keep in mind that if the streaming audio absolutely doesn't work for you, you can listen to the archive in about a minute after we end the stream. We've been told it works fine, even if you were having streaming issues.
The streaming audio player will appear on this web page when the show starts at 12:00 pm Eastern today. Note however that some companies block live audio streams. If when the show starts you don't hear any audio, try refreshing your browser. We've found Firefox and Chrome have the best results.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.