A Guide to Securing your IoT Device using Arm TrustZone for Cortex-M

The webinar recording can be accessed at the link below: Webinar Recording Webinar Description Securing embedded systems has become a critical task for developers. It is nearly impossible to turn on the news and not hear about yet another major security breach. In this webinar, attendees will become familiar with the design methodologies necessary to … Continue reading A Guide to Securing your IoT Device using Arm TrustZone for Cortex-M

7 Tips for Selecting a Secure Microcontroller

Developing a secure, connected device that can also operate efficiently requires that developers select a microcontroller that includes specific hardware and software features. These features can range from true random number generators through secure libraries. Let’s examine several tips for the hardware and software that developers should consider having in their secure microcontroller. Tip #1 … Continue reading 7 Tips for Selecting a Secure Microcontroller