Security
-
Prioritize Embedded System Security for Edge Applications
Learn about a decentralized security approach based on zero-trust principles, security by design, and threat intelligence and monitoring.
- Learn More
-
Securing Embedded Edge Devices
This article explores a decentralized security framework for embedded devices, focusing on confidentiality, integrity, and availability.
-
Build Secure Commercial Products with STM32Trust
To enhance security in embedded hardware solutions, developers are exploring the STM32Trust for comprehensive defense-in-depth design strategies.
-
Progression of Authentication: Passwords, Passphrases, and Passkeys
With human errors posing the biggest vulnerabilities in cybersecurity, understanding authentication best practices has never been so important.
-
Analog Devices - Embedded Security: Keeping Edge Data Safe
Industry experts discuss embedded security, focusing on edge data protection, including secure management, trusted operations, and IT/OT convergence.
-
As 5G Advances in Industry 4.0, So Does Cyber Risk
More connected devices create more endpoints for cybersecurity threats and the need for strict cyber hygiene.
-
Real Biometric Solutions for Consumer Devices
Products that help obtain and process biometric data show great promise in future consumer devices.
-
18:24
EdgeLock® Secure Element & Secure Authenticator -- NXP and Mouser Electronics
In this episode of Chalk Talk, Amelia Dalton and Antje Schutz from NXP explore NXP’s EdgeLock Secure Element and Secure Authenticator Solution.
-
Practical Tips for Embedded System Security
(Source: Nikolay N. Antonov - stock.adobe.com) While embedded systems tend to lack the processing horsepower of servers or even modern personal computers, the sheer number of devices is making...
-
What Is the Quantum Internet and Who Will Use It?
(Source: kras99 – stock.adobe.com) As if the internet couldn’t get any more overwhelming, we have to go and add the word “quantum” in front of it. Why? To answer this question, I recently sat...
-
Protect IoT Applications Using Three Key Security Enablers
(Source: Michael Traitov -stock.adobe.com) Engineers working on mission-critical applications in mil/aerospace and other segments have for years followed some fundamental principles of security...
-
Secured IoT Devices
Many IoT devices monitor and control vital aspects of our lives. We need to rest assured that they are secure and not used nefariously.
-
The IoT Machine Authentication Dilemma
(Source: Sashkin - stock.adobe.com) Most of the time, we're surrounded by dozens of devices that contain connectivity to the world wide web. Whether they are directly part of our inventory or...
-
Cybersecurity Solutions for a Secure Smart Home
In this week's New Tech Tuesdays, we'll look at turnkey solutions from Infineon Technologies and NXP Semiconductors and a key storage device from Microchip Technology.
-
Reducing IoT-Enabled Smart Grid Risks
The increasing dependence on IoT devices used in smart grid technologies increases the number of vectors vulnerable to cyber-attacks.
-
Establishing Secure Authentication in Automotive
(Source: Joe Prachatree/Shutterstock.com) Authenticating Andrew Jackson What is real? What is fake? Digital economies are an integral part of our digital age, and perhaps more than ever, we...
-
Learn More About Digital Security with Cryptographic Development Kit
In this week's New Tech Tuesdays, we'll take a close look at the SparkFun Cryptographic Development Kit.
-
Securing the IoT with Blockchain
Hype and mystery still surrounds blockchain technology. Although the term is generally associated with cryptocurrencies, the range of possible applications is much more extensive.
-
Secure Software Development Can Be Challenging
We explore secure coding and provide you with examples of resources for secure coding, including industry standards, guidelines, regulations, and accepted testing and validation protocols.
-
Counterfeiting: How It Happens and How to Help Stop It
The factors leading to developing trends in counterfeit parts are intricate and many. Learn ways to identify counterfeiting and react accordingly in the procurement process.
- Loading More...