Security

  • Prioritize Embedded System Security for Edge Applications

    Prioritize Embedded System Security for Edge Applications

    Learn about a decentralized security approach based on zero-trust principles, security by design, and threat intelligence and monitoring.

    Read Blog
  • Learn More
  • Securing Embedded Edge Devices

    Securing Embedded Edge Devices

    This article explores a decentralized security framework for embedded devices, focusing on confidentiality, integrity, and availability.

    Read Article
  • Build Secure Commercial Products with STM32Trust

    Build Secure Commercial Products with STM32Trust

    To enhance security in embedded hardware solutions, developers are exploring the STM32Trust for comprehensive defense-in-depth design strategies.

    Read Blog
  • Progression of Authentication: Passwords, Passphrases, and Passkeys

    Progression of Authentication: Passwords, Passphrases, and Passkeys

    With human errors posing the biggest vulnerabilities in cybersecurity, understanding authentication best practices has never been so important.

    Read Article
  • Analog Devices - Embedded Security: Keeping Edge Data Safe

    Analog Devices - Embedded Security: Keeping Edge Data Safe

    Industry experts discuss embedded security, focusing on edge data protection, including secure management, trusted operations, and IT/OT convergence.

    Read eBook
  • As 5G Advances in Industry 4.0, So Does Cyber Risk

    As 5G Advances in Industry 4.0, So Does Cyber Risk

    More connected devices create more endpoints for cybersecurity threats and the need for strict cyber hygiene.

    Read Article
  • Real Biometric Solutions for Consumer Devices

    Real Biometric Solutions for Consumer Devices

    Products that help obtain and process biometric data show great promise in future consumer devices.

    Read Article
  • EdgeLock® Secure Element & Secure Authenticator -- NXP and Mouser Electronics18:24

    EdgeLock® Secure Element & Secure Authenticator -- NXP and Mouser Electronics

    In this episode of Chalk Talk, Amelia Dalton and Antje Schutz from NXP explore NXP’s EdgeLock Secure Element and Secure Authenticator Solution.

    Watch Video
  • Practical Tips for Embedded System Security

    Practical Tips for Embedded System Security

    (Source: Nikolay N. Antonov - stock.adobe.com) While embedded systems tend to lack the processing horsepower of servers or even modern personal computers, the sheer number of devices is making...

    Read Article
  • What Is the Quantum Internet and Who Will Use It?

    What Is the Quantum Internet and Who Will Use It?

    (Source: kras99 – stock.adobe.com) As if the internet couldn’t get any more overwhelming, we have to go and add the word “quantum” in front of it. Why? To answer this question, I recently sat...

    Read Article
  • Protect IoT Applications Using Three Key Security Enablers

    Protect IoT Applications Using Three Key Security Enablers

    (Source: Michael Traitov -stock.adobe.com) Engineers working on mission-critical applications in mil/aerospace and other segments have for years followed some fundamental principles of security...

    Read Article
  • Secured IoT Devices

    Secured IoT Devices

    Many IoT devices monitor and control vital aspects of our lives. We need to rest assured that they are secure and not used nefariously.

    Read Article
  • The IoT Machine Authentication Dilemma

    The IoT Machine Authentication Dilemma

    (Source: Sashkin - stock.adobe.com) Most of the time, we're surrounded by dozens of devices that contain connectivity to the world wide web. Whether they are directly part of our inventory or...

    Read Blog
  • Cybersecurity Solutions for a Secure Smart Home

    Cybersecurity Solutions for a Secure Smart Home

    In this week's New Tech Tuesdays, we'll look at turnkey solutions from Infineon Technologies and NXP Semiconductors and a key storage device from Microchip Technology.

    Read Article
  • Reducing IoT-Enabled Smart Grid Risks

    Reducing IoT-Enabled Smart Grid Risks

    The increasing dependence on IoT devices used in smart grid technologies increases the number of vectors vulnerable to cyber-attacks.

    Read Article
  • Establishing Secure Authentication in Automotive

    Establishing Secure Authentication in Automotive

    (Source: Joe Prachatree/Shutterstock.com) Authenticating Andrew Jackson What is real? What is fake? Digital economies are an integral part of our digital age, and perhaps more than ever, we...

    Read Blog
  • Learn More About Digital Security with Cryptographic Development Kit

    Learn More About Digital Security with Cryptographic Development Kit

    In this week's New Tech Tuesdays, we'll take a close look at the SparkFun Cryptographic Development Kit.

    Read Article
  • Securing the IoT with Blockchain

    Securing the IoT with Blockchain

    Hype and mystery still surrounds blockchain technology. Although the term is generally associated with cryptocurrencies, the range of possible applications is much more extensive.

    Read Article
  • Secure Software Development Can Be Challenging

    Secure Software Development Can Be Challenging

    We explore secure coding and provide you with examples of resources for secure coding, including industry standards, guidelines, regulations, and accepted testing and validation protocols.

    Read Article
  • Counterfeiting: How It Happens and How to Help Stop It

    Counterfeiting: How It Happens and How to Help Stop It

    The factors leading to developing trends in counterfeit parts are intricate and many. Learn ways to identify counterfeiting and react accordingly in the procurement process.

    Read Article
  • loading
    Loading More...