Jun 02, 2022 - Security - by Bernhard Günthner
Enhance security systems with Artificial Intelligence innovation
As more people gain access to the internet worldwide, the importance of effective cybersecurity increases. There are those who intentionally aim to exploit and gain unauthorized access to an organization’s systems and confidential informa...
Apr 27, 2022 - Security - by Andreas Schlaffer
Agile Engineering in Safety and Medical Technology: A Contradiction?
Requirements are strict in safety and medical engineering. Is it possible to apply both the
V Model and the SCRUM method to this field?
Andreas Schlaffer, Head of R&D at Kontron Austria, explains the pros and cons of b...
Jul 03, 2020 - Security - by Vincent Chuffart
Securing your company’s embedded computing future - PART 3
Kontron launches SEC-Line Platform for secure embedded computing environments
Embedded computing is morphing into edge computing, where systems deployed in the real world are always connected. In turn, this is demanding closer pr...
Mar 27, 2020 - Security - by Vincent Chuffart
The Future of Secure Embedded Computing - Part 2
Keeping connected infrastructures healthy and secure in the physical world
If ever a superhero was needed, it’s now: One with ‘X-ray vision’ and extra sensory perception that intuitively identifies imminent danger and is always the...
Mar 13, 2020 - Security - by Stefan Eberhardt
System Security: Some Truths about Secure Communication Lines & Updates
While all that stuff like TPM and secure/trusted boot is good to hide and secure what's inside the box, it helps to protect a system from mostly physical attacks. However, the attack scenario in the industrial...
Nov 08, 2019 - Security - by Vincent Chuffart
When two worlds collide: Why Edge Computing is disrupting the current IT/OT status quo when it comes to security
As Edge Computing continues to expand, differing priorities are inevitably going to cause growing friction between IT and OT – unless carefully managed. But, at the end of the day, when it comes to what is connected to company n...
Oct 03, 2019 - Security - by Stefan Eberhardt
Certificates, Keys and Hashing - Some Insider-Basics
With this blog, we reached the middle of my security series - some problems were pointed out and solutions were given. Let´s now look a little bit deeper into the topic and let me explain in my words (I promise to keep it crispy) some ba...
Jul 04, 2019 - Security - by Stefan Eberhardt
SUSieTec: Security Components Overview
Looking back at the last three articles, they more focus on describing the problem and the border condition of security rather than appropriate solutions. Finally, this article will provide some interesting approaches that secure ...
Apr 30, 2019 - Security - by Stefan Eberhardt
Assessment of the End Product
In this blog, I want to do a security assessment of an end device. To get started, we will avoid making a mistake that happens a lot in our business! So please forget all security solutions that you have heard of and let us look a...
Feb 07, 2019 - Security - by Stefan Eberhardt
IT-Security and the Impact of IoT
Welcome back to the second episode of my security blog series!
So when we combine the ‘old unconnected industry’ with IT-connectivity stuff (I will not explicitly call it ‘IoT’ because it is much, much more) we hav...
Nov 29, 2018 - Security - by Stefan Eberhardt
Security – how much do I need?
So back at S&T/Kontron, we decided to revive the security topic on our blog. It is quite broad so let's slice and dice it down to smaller parts. Let's start with the obvious: everybody needs security and wants secu...
Jan 20, 2017 - Security - by Stefan Eberhardt
Hacker Eldorado IoT: Security Risks in the Internet of Things
2016 was an extremely thrilling year for IT security experts. A controversial hacking discussion surrounded the US election and even outside of politics, high-profile attacks on IT systems were manifold. What many hacks had in common was th...
Dec 02, 2016 - Security - by Stefan Eberhardt
Standard IoT Security Solution Offers Protection Against Hackers
Industry 4.0 and the Smart Factory promise a boost for innovation in the production sector. However, corresponding IoT security measures are still only beginning to develop, according to a study by the German Federal Ministry for Economic A...
Oct 13, 2016 - Security - by Stefan Eberhardt
Kontron Security Solutions: Embedded Systems Safe and Sound
When I started working in the embedded computer market in 2004, except for a few select customers in the defense sector of the industry, it was absolutely oblivious to security vulnerabilities. The ever increasing importance of connected sy...
Oct 08, 2015 - Security - by Sarah Kamrau
IoT Security: Is the State Device ID a Good Idea?
The Internet of Things is a whole new infrastructure which of course leads to a number of challenges that must be addressed. In Germany there are plans for an “Identity Safety Act” that should protect this new infrastructure. Right now,...
Sep 10, 2015 - Security - by Sarah Kamrau
Wi-Fi in Aircraft: Are we Safe from Hacker Attacks or Hijacking?
An increasing number of airlines offers „On-Board Wi-Fi“ to their passengers with connectivity improvements to the aircraft while it is on the ground (3G/4G LTE) and in-flight (air-to-ground and air-to-satellite). This develop...
Jan 14, 2015 - Security - by Daniela Hoffmann
Internet of Things and Security: Mission impossible?
The internet of things (IoT) will be the next step in integrating even more of the real world into the web. With this step companies and consumers will be facing billions of insecure devices because of the inadequate security meas...
Aug 13, 2014 - Security - by Jack London
Secure Gaming Machines: Wanna bet on it?
Ever since the gaming industry introduced electronic video slot machines and subsequently other electronic gaming formats, the game designers have been in pursuit of that next best irresistible game that will attract and intoxicate players ...
Apr 15, 2014 - Security - by Vincent Chuffart
How do you feel today?
Being a computer person, I usually do not see technology like a form of black magic. Whenever I consider even the most complex system, I can imagine all the small pieces and the collection of techniques humming within this marvel. Aft...
- Security - by Claus Giebert
Air-condition with built-in backdoor
It’s really surprising what you hear in M2M (Machine-to-Machine) groups. Last time I read an unbelievable data point:
55,000 air-condition or heating systems are connected to the Internet without adequate (or any) protection