Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates. However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack. 

Join this webinar to learn about:

  • Common attacks, threats and security considerations for embedded software
  • Using static analysis to find and fix security vulnerabilities  
  • Application whitelisting – preventing malware and unauthorized changes
  • Employing threat modeling as a defensive measure against security threats


  • Ed Adams, CEO, Security Innovation
  • Gwyn Fisher, CTO, Klocwork
  • Paul Paget, CEO, Savant Protection