Encryption, authentication, secure boot functionality, and tamper detection are among the best practices used to secure connected computers and servers. These same practices can be part of embedded devices, but usually they cannot be added to a device the way they are often added...
Silicon Valley's internet of things developers conference has laid claim to a key audience within the IoT ecosystem: the developers who create the software and embedded systems to connect devices to the internet and analyze the data they generate.
The show filled a wing of...