2021-11-29 - Nitin Dahad

Consumer IoT: Vulnerability disclosure practice “unacceptably low”

Despite small year-on-year improvements, progress on vulnerability disclosure for consumer IoT security is unacceptably low according to the IoT Security…

2021-11-19 - Stephen Las Marias

A testament of IP leadership

Arm has won three awards at the inaugural EE Awards Asia: Featured IoT Cybersecurity Chip Supplier for Taiwan, and Best…

- Microchip Technology Inc.

Microchip’s achievements recognized at EE Awards Asia

The EE Asia Awards further demonstrate Microchip's focus on smart, connected, and secure solutions.

2021-11-18 - Analog Devices Inc.

Analog Devices now certified to ISO/SAE 21434:2021

Analog Devices is now certified to ISO/SAE 21434:2021, the new automotive cybersecurity standard for production road vehicle electrical and electronic…

2021-10-27 - Michael Mehlberg

10 fatal mistakes in embedded systems security

Here are the common cybersecurity oversights that could compromise your critical applications and data.

2021-10-06 - Jorge Myszne

Addressing the growing threat of firmware attacks on enterprise edge computing platforms

The threat landscape facing edge-computing systems in enterprise-level applications is dire. As this threat environment evolves, defending against these intrusions…

2021-09-15 - Majeen Ahmad

The analog side of the embedded security in SoC designs

Analog monitors such clocks and voltage sensors can oversee the underlying analog behavior of an SoC for potential signs of…

2021-09-03 - Nitin Dahad

Growing use of encryption poses network security risk

Pervasive encryption may enhance network traffic security, but the use of encryption also exposes users to threats from malicious traffic.

2021-08-27 - Simon Jakob

Which achieves better security: Ad hoc testing or certification?

While ad-hoc testing is good for getting a quick assessment of the obvious potential for attack, certification pursues a long-term,…

2021-08-23 - Nitin Dahad

VE-VIDES explores trustworthy design and verification flow for IoT security

VE-VIDES will look at identifying a novel IP design and verification flow that will ensure trustworthiness, especially in security-critical electronic…