{"id":1566,"date":"2020-04-26T12:01:13","date_gmt":"2020-04-26T12:01:13","guid":{"rendered":"https:\/\/cisobyte.com\/?p=1566"},"modified":"2020-04-29T22:09:53","modified_gmt":"2020-04-29T22:09:53","slug":"eliminating-vulnerabilities-by-design","status":"publish","type":"post","link":"https:\/\/cisobyte.com\/index.php\/2020\/04\/26\/eliminating-vulnerabilities-by-design\/","title":{"rendered":"Eliminating Vulnerabilities by Design"},"content":{"rendered":"<h4 style=\"text-align: left;\"><strong>CISObyte&nbsp; &nbsp; 04-26-2020<\/strong><\/h4>\n<p><\/p>\n<h4>Always great to combine two passions: cutting-edge cybersecurity research from the University of Michigan.<\/h4>\n<h2>&#8220;Preventing hackers from disabling or taking control of electronic devices has proven to be an ongoing challenge, because malicious actors tend to be two steps ahead of researchers and manufacturers.&#8221;<\/h2>\n<p>The linked article from Michigan Today discusses the various threats to IoT, and the challenges faced in securing them. Like the internet that came before, IoT devices were not designed with security in mind. \u201cIt\u2019s a little scary to know that all these electronic products have been put on the market before we figured out the basic science and engineering for securing the sensors inside them.\u201d&nbsp;<\/p>\n<ul>\n<li>IoT<\/li>\n<li>Vulnerability Management<\/li>\n<li>Secure Design<\/li>\n<li>Embedded Security<\/li>\n<\/ul>\n<div class=\"vlp-link-container vlp-template-default \">\n\t<a href=\"https:\/\/michigantoday.umich.edu\/2020\/04\/23\/probing-techs-soft-underbelly\/\" class=\"vlp-link\" title=\"Michigan Today - Probing tech\u2019s soft underbelly\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/michigantoday.umich.edu\/wp-content\/uploads\/sites\/89\/mc-image-cache\/2020\/04\/Probing-tech-underbelly-fu-feat-4-20.jpg\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tMichigan Today - Probing tech\u2019s soft underbelly\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tProfessor Kevin Fu is a master at tricking electronic devices into seeing false realities. But his scientific shenanigans are designed to help, not harm.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Always great to combine two passions: cutting-edge cybersecurity research from the University of Michigan.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[18,19],"tags":[8,20,14,13],"class_list":["post-1566","post","type-post","status-publish","format-standard","hentry","category-iot","category-secure-design","tag-cybersecurity","tag-iotsecurity","tag-secure-design","tag-vulnerability-management"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1566"}],"version-history":[{"count":4,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1566\/revisions"}],"predecessor-version":[{"id":1622,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1566\/revisions\/1622"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/categories?post=1566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/tags?post=1566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}