Many embedded systems today must be secure. Many of these devices also have complex timing requirements that also require an RTOS. In this course, we...
Read More >>>Category Archives: Security
Embedded Software Trends to Watch in 2023
As 2022 creeps to a close, many of you probably reflect on what went right and what didn’t. You’re probably looking to the future and...
Read More >>>5 Elements to a Secure Embedded System – Part #5 Secure Storage
In “5 Elements to a Secure Embedded System – Part 4 Secure Bootloaders,” we continued...
Read More >>>5 Elements to Secure Embedded Systems – Part #4 Secure Bootloaders
In “5 Elements to a Secure Embedded System – Part 3 Secure Boot”, we continued...
Read More >>>3 Use Cases for Multicore Microcontrollers
Multicore microcontrollers are starting to become popular among embedded systems designers. Designers can leverage multiple cores by breaking their applications up into separate application (execution)...
Read More >>>Programming the STM32 Option Bytes using SEGGER J-Flash
Nearly every microcontroller contains option bytes, fuses, or some method to control general settings on the processor. These settings often control features such as whether...
Read More >>>3 Development Boards to Get Started with TrustZone for Cortex-M Microcontrollers
Developing a product today without taking security into account is foolhardy. Nearly every device being...
Read More >>>5 Elements to Secure Embedded Systems – Part #3 Secure Boot
In “5 Elements to a Secure Embedded System – Part 2 Root-of-Trust”, we continued our...
Read More >>>5 Elements to Secure Embedded System – Part #2 Root-of-Trust (RoT)
In “5 Elements to Secure Embedded Systems – Part #1 Hardware-Based Isolation”, we started our...
Read More >>>5 Elements to Secure Embedded Systems – Part #1 Hardware Based Isolation
Nearly every embedded system requires some level of security, whether it’s just the basics to...
Read More >>>Webinar – An Introduction to Secure Product Lifecycle Management (sPLM)
The Webinar Recording can be accessed at the following link: Click here to Watch Webinar...
Read More >>>The 3 Stages in Secure Product Lifecycle Management
Nearly every embedded software developer working in the IoT space is now building secure devices. Developers have been mostly focused on how to handle secure...
Read More >>>