Category

Insights

Insights

IoTAC Use Case: Connected Car

The new IoTAC security model for IoT architectures will be deployed and validated in four different pilots, representing diverse industry domains. In the case of the connected car, the pilot will provide a cooperative, connected and automated (CCAM) scenario, where V2X (Vehicle to Everything) data exchange enables cooperative manoeuvres integrating…
Insights

Release & Deploy Phase Methodology

With all the interconnected devices in the world, integrated seamless communication is a must. This always-available access is seemingly at odds with the goal of security. Additionally, the way in which applications are built has changed over time with many companies merging agile techniques with development and operation processes. The…
Insights

Instilling Security in the Implementation Phase of Software Engineering

In recent years, the software development paradigm has evolved under the influence of several key trends. The wider adoption of Agile and DevOps practices has increased the pace in which applications are packaged, built, and shipped to production. The fast pace of digitalisation in enterprises has created a push for…
Insights

The IoTAC Software Security by Design (SSD) Platform – Concept and Preliminary Overview

Software Security by Design The high interconnectivity that characterizes modern IoT Systems, along with the increasing accessibility of their devices through the Internet, renders their security an aspect of major concern for IoT users and providers. The importance of securing IoT Systems is further supported by the important security incidents…