Recent Blog Posts
My interview with John Neil Conkle on the topic of APIs and developer evangelism is now live over here.
Attendees at the National Retail Federation (NRF) Big Conference in New York this month saw first-hand how Intel has become a world leader in delivering a personalized retail experience based on Internet of Things solutions. From the hugely popular Memory … Read more >
The post Intel IoT Delivers the “Ultimate Store Experience” to Retailers at NRF15 appeared first on IoT@Intel.
Mobile devices and technology have allowed clinicians to gather patient data at the point-of-care, access vital information on the go, and untether from traditional wired health IT infrastructures. One hidden benefit of mobile capability is how doctors can gain access to data which analyzes their own performances.
In the video above, Jeff Zavaleta, MD, chief medical officer at Graphium Health and a practicing anesthesiologist in Dallas, shares his insight on how mobile devices offer a new opportunity for practitioners to self-evaluate, answer the question, “how did you do this week?,” and see key performance indicators such as their average patient recovery times and on-time appointment starts.
Watch the short video and let us know what questions you have about the future of mobile health IT and where you think it’s headed. How are you using mobile technology to improve your practice?
Also, be on the lookout for new blogs from Dr. Zavaleta, who will be a guest contributor to the Intel Health & Life Sciences Community.
As developers harness the possibilities of Intel® RealSense™ technology, there is plenty to explore. Along with the Intel RealSense SDK, they are exposed to a new kind of “camera”. The first… Read more
This week is the start of the 2015 AHR Expo in Chicago, the world’s largest HVACR (heating, venting, air conditioning, and refrigeration) conference that connects industry peers and showcases the latest in HVACR tech and equipment trends. In this guest … Read more >
The post Smart Building Manufacturers Demo Latest IoT Solutions at AHR Expo appeared first on IoT@Intel.
Over the past few years Intel has collaborated on a number of projects to raise awareness and catalyze action to expand education and technology access for girls and women. Our latest collaboration is Intel’s sponsorship of the upcoming 3-part documentary … Read more >
The post A Path Appears: Moving from Challenges to Solutions appeared first on CSR@Intel.
By Alice Borrelli, director of Global Heath Policy for Intel Intel recognizes the importance of innovative payment models as a way to improve the US healthcare system and applauds Secretary Burwell’s announcement that the Department of Health and Human Services … Read more >
The post Intel Supports Innovative Payment Reform for Healthcare Services appeared first on Policy@Intel.
With approximately 47,000 buildings in Manhattan alone, it’s easy to contemplate how smart building solutions—a combination of elements including Building Management Systems (BMS), sensors, control systems, and big data that improves productivity and efficiency in large properties—can create huge value … Read more >
The post Teamwork, IOT Technology Lead to Real-World Smart Building Success appeared first on IoT@Intel.
With 2015 in full swing, many of us are holding onto our resolutions, promising we will at least carry them into February. In recent years, technology has played a more central role in helping us keep our resolutions. From fitness … Read more >
The post Maximize Your 2015 New Year’s Resolution Success with an Intel-Powered Tablet appeared first on Technology@Intel.
I’m always in awe of great photographers. You see, I’m the kind of guy who just sets his camera on AUTO and hopes for the best. I keep meaning to sign up for that photography class but it never seems … Read more >
CES 2015 has come and gone. If you were lucky enough to be there and see the amazing Intel booth, you probably heard a lot about user experience, or “UX” for short. That’s because Intel is searching for ways to … Read more >
According to the Brookings Institute, 90 percent of Americans drive to work, a statistic that helps me understand why I seem to be stuck in traffic all the time. The numbers might be slightly lower globally, but it’s safe to … Read more >
The post New IoT Study Explores Security Solutions for ADAS appeared first on IoT@Intel.
Identifying and correcting security vulnerabilities in applications has become more increasingly vital with Static Code Analysis tools in conjunction with manual code reviews. Static Code Analysis includes an automated software tool that examines a program’s source code without actually executing it. This type of analysis is used to identify different kinds of security issues, obscure logic problems, bugs and defects, and more. Even more importantly, it is becoming common to have an organizational policy that includes the requirement. It is already a compliance requirement for organizations that must comply with Payment Application Data Security Standard (PCI PADSS).
There are a plethora of vendors with static code analysis tools that we won’t be comparing here but rest assured the most common development languages are supported. These tools can be very helpful in determining adherence to secure coding standards. But one of the biggest challenges to getting started is the shock of a report after an initial codebase is analyzed. There could be tens of thousands of issues found when an analysis is completed for a large codebase that has never been scanned before. Going through the static code analysis report can be beneficial in helping to identify high risk security areas but can also be time consuming to research what may result in false alarms. Either way, the effort must be made to review such a report as it helps demonstrate due diligence by documenting the review of potential vulnerabilities. For the software engineer being asked to address issues found in a large legacy code base, it can present more stress added on to the workload for developing the next release.
If a threat model was completed during the design phase of the application development, it can help to describe the security objectives or privacy requirements for the application and how those objectives mitigate threats in possible misuse or abuse cases. The main focus should have been on protecting the system and the information being processed. Furthermore, an attack surface analysis helps with defining how an external adversary may attempt to attack the application and focuses more on the high risk areas where there may be more exposure such as Internet connected interfaces. If these tools were not used during the development phase, maybe other types of risk based approaches provided the same result. But if not, it’s advisable to start having these conversations with all stakeholders so that the security objectives and attack surface mitigations can be well defined. It’s likely that an Advance Persistent Threat (APT), albeit with limited knowledge of the system, would use similar tools when attempting to identify an application’s potential weaknesses for the purpose of exploiting them.
Requirement for static code analysis has become more commonly integrated into an organizations secure application development processes and it helps with adherence to ISO 27034. It’s also advisable to integrate Threat Modeling and Attack Surface Analysis into the lifecycle as well. These tools are helpful in prioritization efforts so that identified issues in static code analysis reports can be focused on the most important security features of an application first. This will undoubtedly help the security reviewer gain traction on an effort that may seem overwhelming at first.
Find Andy on LinkedIn
See previous content from Andy_Good
Start a conversation with Andy on Twitter
PP14 adopted two new Decisions and 20 new Resolutions. Three existing Decisions and 51 Resolutions were modified and seven Resolutions were suppressed. The final acts are available here. While there were rumors leading up to the meeting that there might … Read more >