<![CDATA[Safety & Security]]> Standards, regulations, and techniques for implementing safe and secure systems. 4442762 <![CDATA[Strong identity for devices tackles hidden costs in IoT security]]> 2016-09-27T19:03:00Z 4442751 <![CDATA[Deploying bluetooth low energy and NFC for secure connections and easy pairing]]> 2016-09-26T13:30:00Z 4442732 <![CDATA[Where are the IoT security startups?]]> 2016-09-21T19:14:00Z 4442720 <![CDATA[Security protocol establishes system-level root of trust]]> 2016-09-19T20:26:00Z 4442718 <![CDATA[NIST floats cybersecurity draft reports for comment]]> 2016-09-19T20:18:00Z 4442683 <![CDATA[GM recalls 4.3 million vehicles for airbag software defect]]> 2016-09-12T16:49:00Z 4442551 <![CDATA[Crypto chip simplifies AWS IoT security]]> 2016-08-15T14:48:00Z 4442489 <![CDATA[Security experts expose latest Jeep vulnerability]]> 2016-08-04T14:13:00Z 4442211 <![CDATA[Printing IoT security]]> 2016-06-14T13:59:00Z 4442182 <![CDATA[Cyber-security vexes automakers]]> 2016-06-08T12:22:00Z 4442103 <![CDATA[Safety critical systems - the basics]]> 2016-05-25T19:23:00Z 4442086 <![CDATA[Group hopes better testing will thwart hackers]]> 2016-05-24T16:00:00Z 4442048 <![CDATA[Software Standards Compliance 101: Critical role of documentation]]> 2016-05-18T18:28:00Z 4442045 <![CDATA[Experts find IoT security lacking]]> 2016-05-18T14:27:00Z 4441863 <![CDATA[Software Standards Compliance 101: Using coverage analysis to assess test completeness]]> 2016-04-19T17:06:00Z 4441700 <![CDATA[Software Standards Compliance 101: Tracing code to requirements]]> 2016-03-23T00:09:00Z 4441550 <![CDATA[Security experts talk Apple v FBI]]> 2016-03-02T18:04:00Z 4441410 <![CDATA[Software Standards Compliance 101: Implementing a programming standard]]> 2016-02-12T18:43:00Z 4441278 <![CDATA[Bleak security outlook]]> 2016-01-25T17:47:00Z 4441129 <![CDATA[Software Standards Compliance 101: Using a formal requirements capture process]]> 2016-01-04T21:28:00Z