In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course, there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. In addition, an increasing portion of connected systems involve devices that can potentially damage people or physical property if compromised.
No device or system connected to the public Internet should be considered impenetrable, because impenetrability is impossible to prove. While one can hope that no attack will succeed, it is best to assume that some will. Long gone are the days when systems administrators assumed that if they could control the perimeter of a network, they could prevent all unauthorized access. Today, insider threats pull security boundaries inward, while cloud services project them outwards. The perimeter itself can be both flexible and indistinct. Perimeter security remains necessary, but it is not sufficient.
Download this whitepaper to learn more.