Fall Trade Shows featuring Ciqada and Mars International

Fall is a popular time for trade shows, and ciqada and Mars International are hitting the road.

First up, we’re heading to Chicago, for the WEFTEC show, which runs from October 2 to October 4. After that, we’ll be in Orlando, which hosts this year’s International Pool | Spa | Patio Expo in Orlando from November 1 through 3.

Ciqada provides design expertise and services using our portfolio of proven technologies to help businesses develop, commercialize, and manage IoT products. We have developed several IoT applications in the water management industry as well as pool and spa automation.

mars international, Ciqada

Is your IoT Product Safe? Identifying Critical Software Security Flaws – Part 3

Security flaws can allow access to sensitive information within the application layer.

Identifying Critical Software Security Flaws – Part 3

This series of articles is focused on application layer vulnerability because it can be exploited to compromise the confidentiality, integrity or availability of resources used by the application and its users. This layer may be difficult to protect so it is important to understand how it could be compromised. It is also very accessible to cyber criminals, so the best way to make the application layer secure is to ensure you develop secure applications.

Ciqada, security flaws

Is Your IoT Product Safe? Identifying Critical Software Security Flaws – Part 2

iStock-158695294_RT.jpg

In our first article in this series, we talked about two key areas of IoT software vulnerability, injection flaws, and broken authentication and session management.

Ciqada

Is your IoT Product Safe? Identifying Critical Software Security Flaws – Part 1

In our recent ciqada white paper, we outlined ten critical areas where security issues can impact the safety of your IoT systems. We will re-cap this information in four articles, each of which will focus on two to three elements that should be considered to help protect your IoT enabled devices and systems.

In this article, we will talk about injection flaws along with broken authentication and management.

IoT, IoT security