Security is about a long chain of links. How do you control this and ensure that data exchange is reliable? That the device is who it says it is; secure boot, secure firmware, control over your application wherever it is. How do you do that? But also, how do you stay flexible in your business model and how is your intellectual property safe in an ever shorter time to market?
Jan-Willem van de Blaak & Ton van den Berg Wibu Systems