About

Greetings ! This blog collects thoughts on securing increasingly powerful and connected computational devices. The security risks are getting worse with rising software complexity, device connectivity and the increasing dependence people have on technology.

Because security of a system is as good as that of its weakest link, a systems view is required to understand threats and countermeasures. The ‘system’ includes the technical infrastructure such as devices, clients, servers, applications, databases, network and storage systems, but also the data flows, the people, and the processes for governance and control of these resources. As a result effective security involves a collaborative effort of parties working in different domains and roles, as well as an understanding and leveraging of technologies that are changing rapidly – for example – cloud, big data, mobile and IOT.

We invite you to browse, comment and subscribe – as we look at security of different links in the chain of the connected world.

Ruchir Tewari, ruchir@securemachinery.com

Note: All opinions expressed on this blog are personal and do not represent the views of my employer.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s