Trust...but verify *

Trust...but verify *

*Ronald Reagan

To build a different world after this crisis, we will need even more trust among governments, companies, citizens. In this long journey, respecting the Intellectual Property is one milestone among many others.

It seems that we are not taking this path: in the context of Covid-19, the International Chamber of Commerce alerted us about an increase  in the production and manufacturing of fake and counterfeit goods, including in manufactured electronics products .

This is disappointing, though not a big surprise for OEM Executives for whom  software & IP protection has always been a major concern, on top of devices cloning.

Security technologies have been deployed for decades to protect data and software, including state-of-the art cryptography, digital signature, secure boot, obfuscation of executable, to name just a few examples. However, there are still some challenges when those solutions are deployed in embedded systems, including implementation, impacts on performance  and cost effectiveness.

In the emergence of a highly connected world, new solutions have been developed for software & IP protection at the device level, considering the constraints of embedded systems without compromising on security. Additionally, some players can now provide a full set of security solutions ensuring a seamless protection all along the “chain of trust”.

With a stronger “chain of trust”, we will spend less time to verify and more time to innovate!

You can read our position paper on IP Protection in our News at www.trusted-objects.com

 



Stephane Benoist

FABC & Certified Chair? of Advisory Boards | Senior Advisor to Business Owners and SME Leaders | Specialist in business creation and development

4 年

Indeed it looks like we're not taking the path of Trust. We may even be on the edge of some dark times. "After the Covid-19, tomorrow's world will be the same as yesterday, but worst" (Michel Houellebecq, 4 May 2020)

回复

要查看或添加评论,请登录

Jean-Pierre DELESSE的更多文章

  • A step toward a more secure IoT market

    A step toward a more secure IoT market

    We founded Trusted Objects in 2014 with the vision that IoT will not scale without security, and we have spent…

    1 条评论
  • The Good, The Bad and the Ugly

    The Good, The Bad and the Ugly

    Within the industrial sector, we are often observing that technology innovation and cybersecurity never match together.…

  • ECCC

    ECCC

    ECCC stands for European Cybersecurity Competence Center. It is a new proposal from the European Commission to enable a…

    1 条评论
  • One big leap for IoT

    One big leap for IoT

    The LoRa alliance technical committee just issued a new paper regarding security. It includes a small sentence…

    2 条评论
  • Secure or not secure ?

    Secure or not secure ?

    According to a recent report issued by Kaspersky, 105 million attacks on IoT devices have been detected within the…

  • Next step after GDPR ?

    Next step after GDPR ?

    The General Data Protection Regulation (GDPR) is a European directive aimed at protecting data and privacy for…

    1 条评论
  • Data privacy: Facebook or IoT?

    Data privacy: Facebook or IoT?

    Facebook is under criticism as a political consulting firm was able to harvest raw data from 50 million profiles. This…

  • Meltdown, Spectre and IoT

    Meltdown, Spectre and IoT

    It could be the title of a science-fiction movie! Meltdown and Spectre are hardware vulnerabilities allowing programs…

  • Certification and labeling: a major step forward for IoT security

    Certification and labeling: a major step forward for IoT security

    The European Commission has recently launched its Cybersecurity Act to further improve EU cyber resilience and…

    1 条评论
  • Asia is IoT innovation hotbed

    Asia is IoT innovation hotbed

    All aspects of IoT innovation are booming at the same time making the Asian continent the epicenter of many IoT…

    3 条评论

社区洞察

其他会员也浏览了