Security

Often Overlooked Security Implications of Data Corruption

Data corruption happens when the media or the file system fail in some way. While this is bad enough, there can be serious security complications afterwards. Our blog post looks at the problem and the solution.

Who Owns the Data?

A recent article described data as the new oil, with the land grab just beginning. With all the companies that can benefit from your customers' data, this is an apt description. Control over data is something that should factor into every contract and design at this point.

Are Your IoT Devices Secure?

Friday, October 21st was more than just a travel day for the World Series winning Chicago Cubs, it was also a day that 10s of millions of IoT devices launched a coordinated attack on DNS service provider Dyn. This week, a survey from ESET and the National Cyber Security Alliance showed that 40% of consumers are “not confident at all” that their IoT devices are safe, secure, and able to protect personal information

Certifying Security, the Presidential Debate & ESC Minneapolis

Like many Americans, I watched the debate on Monday night, and was pretty disappointed at the candidate’s answers regarding Cyber Attacks. Neither provided anything of substance in their answers, but with these attacks are becoming more sophisticated and having the backing of foreign states, the answer has to be more than just encryption.

Myth Busting for Iot Devices - The File System

Recently, William Lamie published a mythbusting piece that examined the use of an RTOS in IoT devices on Electronic Design. His insightful comments apply to most device designs complex enough to use a microprocessor. Which, these days, is pretty much all of them. We’ve run into a lot of the same myths around one crucial component of the RTOS – the file system.

Survey Says: Protecting Data is a Concern in Embedded

We recently conducted a survey on the state of data security for embedded developers and the projects they are working on as a way to gauge the security concerns of the industry. We wanted to get developers’ opinions on everything related to embedded security, including how they are keeping data secure, if they foresee future projects requiring more security and which security risks they consider are the most important.

On the Road Again: Datalight Heads to Embedded World

The theme of this year’s Embedded World show in Nuremberg, Germany (Feb. 23-25) is “We Are the Internet of Things” and we couldn’t be more excited to demonstrate how Datalight embodies this sentiment. We will once again be co-located with our partner Logic Technology in Hall 4, Stand 108, alongside some of the most innovative software and tools purveyors in the industry.

Security Options in Embedded Designs

A few months ago, the US Department of Health and Human Services defined a data breach as “a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.” Avoiding this means controlling network traffic, access to the device and applications, and protecting the data in storage.

IoT Dev Conference

At last week's Internet of Things Developers Conference held in San Jose demonstrating the value of IoT was clearly top-of-mind. There were predictions of the number of devices that would be part of the IoT ranging from 20 billion to 50 billion.

Securing Data on NAND Flash Media

In an interesting article on security from Warren Kurisu titled Securing Data on Connected Embedded Devices, he discusses three situations where embedded devices need to protect data - when at rest, when in use, and when in transit. Datalight software can help protect the "data in use" case, including addressing an often overlooked vulnerability.

Much Ado About eMMC

Lately you may have noticed a lot of talk about eMMC on our blog and website. If so you may be thinking, "Why is Datalight so excited about eMMC?" Here are 5 top reasons we're jumping on the eMMC bandwagon.

Securely Delete Files on Flash Media

If you've noticed the numerous posts lately on the Datalight blog regarding JEDEC and eMMC, you might be wondering why we're so excited about this particular standard. There are many features that this "smarter" memory will enable for OEMs; In this post I'll focus on one of those features in the eMMC specification -secure delete.

Security and eMMC

The JEDEC eMMC 4.4 specification added two variations to the basic erase command for data security. These were: Secure Erase - A command indicating a secure purge should be performed on an erase group.