Using threat models and risk assessments to define device security requirements

The proliferation of attacks against embedded systems is making designers realize that they need to do more to secure their products and ecosystems.This article describes the most common threats and suggests security measures to help prevent these attacks. Read More Find out how T&VS Verification services help to meet the challenging requirements with respect to [...]

2018-12-06T09:28:09+00:006th December, 2018|Blog, Thought Leadership|

The challenges of Automotive Functional Safety Verification

Functional safety verification is one of the most critical issues for automobile development. Verification engineers developing an SoC for the automotive market must show that it doesn’t have functional safety issues, even if the SoC enters an unexpected state. Here’s the article from Tech Design Forum explains how to tackle the safety verification task ensuring [...]

2018-10-12T05:44:22+00:0012th October, 2018|Blog, Thought Leadership|

The Functional Safety imperative in Automotive design

The automotive industry has entered a period of rapid evolution that is changing the way cars are designed & provide a new and improved vehicle safety systems. However, these sophisticated systems require a fool-proof way to keep drivers safe, which is called functional safety. This article from Design Reuse explores why addressing the needs of [...]

2018-10-12T05:41:41+00:0012th October, 2018|Blog, Thought Leadership|

Compiling for Automotive Safety and Performance

This article from Electronic Design outlines how to build automotive software applications compliant with functional safety standards and describes why it is imperative to select a compiler that is tightly coupled to the hardware so that all safety and performance features can be exploited. Read More Learn more about how T&VS Automotive Verification and Test [...]

2018-10-12T05:39:01+00:0012th October, 2018|Blog, Thought Leadership|

Everything You Need to Know About Penetration Testing

During a penetration test, highly skilled cybersecurity professionals assume the role of attacker and try to break into an organization’s network. Penetration testing is designed to examine security defences and looks for any defects in the network or applications. Technical assessments are also used to detect vulnerabilities and take proactive steps to address the problems. This article [...]

2018-08-16T14:03:57+00:0016th August, 2018|Blog, Thought Leadership|

Changing Security Landscape of IoT Devices

Today, all the companies have shifted from traditional mobile devices to complicated connected devices. To reach the maximum usage of IoT, security challenges of IoT should be addressed. Cyberattacks can cause a fatal consequence for business continuity. If all the devices are compromised, then it will definitely affect the business. This article discusses how security [...]

2018-08-14T08:53:03+00:0014th August, 2018|Blog, Thought Leadership|

Eliminate the IoT security blind spot

The growth of internet of things has led to rapid increase in the devices which must be secured. When people use IoT devices with ease, it is not that easy to secure these devices. The devices, which are out of control, continues to grow and along with it risk also increases. Increased usage of IoT [...]

2018-07-31T06:17:55+00:0031st July, 2018|Blog, Thought Leadership|

5 Tips to Secure IoT

The usage of IoT devices in daily lives has grown swiftly. The devices are used in our homes as well as in our offices. This has increased the demand for security of IoT devices. The technology should do the job perfectly without losing any personal data. This article elaborates what are the basic tips to [...]

2018-07-20T07:04:13+00:0020th July, 2018|Blog, Thought Leadership|