2022-11-02 - Ricardo Camacho

Building and ensuring security for your IoT device

All the security measures designed to enforce encryption, authentication, and protection aren't enough if the asset isn't developed securely at…

2022-08-10 - Mark Pitchford

ISO/SAE 21434: Software certification for automotive cybersecurity

Find out the details and implications of the ISO/SAE 21434 standard for automotive cybersecurity and how it complements ISO 26262.

2022-08-09 - Ang Cui

Protecting industrial control systems needs a proactive approach to firmware security

When we harden one ICS layer, attackers simply shift over to other tactics and targets, and embedded devices like sensors…

2022-06-09 - Joshua Norem

A primer on security of key stages in IC manufacturing lifecycle

The last two stages of the IC lifecycle, board assembly and board test, are owned and controlled by the OEM.

2022-06-03 - Chris Jones

Strategies to achieve better IoT security in Wi-Fi modules

A look at the architecture of Wi-Fi modules and the opportunities for designers to improve IoT device and network security…

2022-05-23 - Microchip Technology Inc.

Microchip strengthens cybersecurity portfolio

The CEC1736 solution extends Microchip's offering for ensuring the cyber resiliency of end equipment in data center, telco, and networking…

2022-05-13 - STMicroelectronics

STMicroelectronics partners with AWS to strengthen IoT connection security

STMicroelectronics' latest solution helps connect IoT devices to AWS IoT Core easily and securely.

2022-04-21 - Joshua Norem

A primer on security in the key stages of IC manufacturing lifecycle

Here is how engineers can identify the threats at each step of the IC production lifecycle and subsequently mitigate them.

2022-04-13 - Ang Cui

Embedded devices remain vulnerable to ransomware threats

Embedded devices need more ransomware protection — right now. But it will require significant time and investment.

2022-03-23 - Mark Hermeling

Top three tips for ensuring software supply chain security

To avoid sacrificing security, organizations are increasingly relying on technologies that can generate a software bill of materials (SBOM) that…