Skip to primary content
Skip to secondary content
Contact Us Today! 248-719-6850 | [email protected]
Contact

BeningoEmbedded Group

Main menu

  • Start Here
  • About
    • About Jacob
    • Events
  • Services
    • Services Overview
    • Consulting
    • Firmware
    • Training
    • Workshops
  • Clients
    • Clients
  • Insights
    • Insights Overview
    • Articles
    • Toolkits
    • Webinars
    • Videos
    • White Papers
    • Newsletter
    • Conferences
  • Store
    • Store Overview
    • Books
    • Embedded Software
    • Online Courses
    • Quick Pay
    • Cart
  • Blog

Simplifying Concepts.
Accelerating Innovation.

Jacob's Blog

Category Archives: Security

Post navigation

< Older Posts
December 29, 2022

Embedded Software Trends to Watch in 2023

As 2022 creeps to a close, many of you probably reflect on what went right and what didn’t. You’re probably looking to the future and...

Read More >>>
December 1, 2022

5 Elements to a Secure Embedded System – Part #5 Secure Storage

In “5 Elements to a Secure Embedded System – Part 4 Secure Bootloaders,” we continued...

Read More >>>
August 19, 2021

5 Elements to Secure Embedded Systems – Part #4 Secure Bootloaders

In “5 Elements to a Secure Embedded System – Part 3 Secure Boot”, we continued...

Read More >>>
August 12, 2021

3 Use Cases for Multicore Microcontrollers

Multicore microcontrollers are starting to become popular among embedded systems designers. Designers can leverage multiple cores by breaking their applications up into separate application (execution)...

Read More >>>
July 22, 2021

Programming the STM32 Option Bytes using SEGGER J-Flash

Nearly every microcontroller contains option bytes, fuses, or some method to control general settings on the processor. These settings often control features such as whether...

Read More >>>
July 15, 2021

3 Development Boards to Get Started with TrustZone for Cortex-M Microcontrollers

Developing a product today without taking security into account is foolhardy. Nearly every device being...

Read More >>>
July 8, 2021

5 Elements to Secure Embedded Systems – Part #3 Secure Boot

In “5 Elements to a Secure Embedded System – Part 2 Root-of-Trust”, we continued our...

Read More >>>
June 24, 2021

5 Elements to Secure Embedded System – Part #2 Root-of-Trust (RoT)

In “5 Elements to Secure Embedded Systems – Part #1 Hardware-Based Isolation”, we started our...

Read More >>>
May 27, 2021

5 Elements to Secure Embedded Systems – Part #1 Hardware Based Isolation

Nearly every embedded system requires some level of security, whether it’s just the basics to...

Read More >>>
June 18, 2020

Webinar – An Introduction to Secure Product Lifecycle Management (sPLM)

The Webinar Recording can be accessed at the following link: Click here to Watch Webinar...

Read More >>>
May 21, 2020

The 3 Stages in Secure Product Lifecycle Management

Nearly every embedded software developer working in the IoT space is now building secure devices. Developers have been mostly focused on how to handle secure...

Read More >>>
December 5, 2019

3 Lessons Learned from an Embedded Systems Security Breach

Several years ago, I was working on a project for a client that involved an embedded Linux machine. I was planning to travel over the...

Read More >>>

Post navigation

< Older Posts

Categories

  • Artificial Intelligence
  • Beningo Embedded News
  • Book Reviews
  • Bootloaders
  • C Concepts
  • C++ Concepts
  • Career Management
  • Conferences
  • Consulting
  • Defect Management (Debugging)
  • Design Cycle
  • Design News CEC
  • Digital Signal Processing (DSP)
  • Downloads
  • Driver Design
  • Embedded Basics
  • Hardware
  • IoT
  • Low Power Design
  • Machine Learning
  • Micro Python
  • Optimization
  • Platforms
  • Prototyping
  • Q&A
  • RTOS
  • Security
  • Software
  • Software Techniques
  • Testing
  • Tips and Tricks
  • Tools
  • Uncategorized
  • Webinars
  • White Papers

Archives

  • ► 2022 (2)
    • ► December (2)
      • Embedded Software Trends to Watch in 2023
      • 5 Elements to a Secure Embedded System – Part #5 Secure Storage
  • ► 2021 (7)
    • ► August (2)
      • 5 Elements to Secure Embedded Systems – Part #4 Secure Bootloaders
      • 3 Use Cases for Multicore Microcontrollers
    • ► July (3)
      • Programming the STM32 Option Bytes using SEGGER J-Flash
      • 3 Development Boards to Get Started with TrustZone for Cortex-M Microcontrollers
      • 5 Elements to Secure Embedded Systems - Part #3 Secure Boot
    • ► June (1)
      • 5 Elements to Secure Embedded System – Part #2 Root-of-Trust (RoT)
    • ► May (1)
      • 5 Elements to Secure Embedded Systems – Part #1 Hardware Based Isolation
  • ► 2020 (2)
    • ► June (1)
      • Webinar - An Introduction to Secure Product Lifecycle Management (sPLM)
    • ► May (1)
      • The 3 Stages in Secure Product Lifecycle Management
  • ► 2019 (2)
    • ► December (1)
      • 3 Lessons Learned from an Embedded Systems Security Breach
    • ► June (1)
      • 5 Tips for using Arm TrustZone in Cortex-M Processors
  • ► 2018 (7)
    • ► December (1)
      • 5 Technologies Embedded System Engineers Should Master in 2019
    • ► November (1)
      • 7 Tips for Getting Started with TrustZone for MCU’s
    • ► July (1)
      • Webinar - Secure Bootloader Design Techniques for MCU's
    • ► June (2)
      • Getting Started using Arm® TrustZone® for Cortex®-M Processors
      • The first ARMv8-M MCU with TrustZone Support
    • ► April (1)
      • 7 Tips for Securing an Embedded System
    • ► February (1)
      • A Guide to Securing your IoT Device using Arm TrustZone for Cortex-M
  • ► 2017 (3)
    • ► November (2)
      • Embedded Basics - Hash Fundamentals
      • 7 Tips for Selecting a Secure Microcontroller
    • ► October (1)
      • Embedded Basics - The Arm Security Manifesto

Latest Blogs

  • 3 Epic Ways AI and ChatGPT are Transforming Embedded
  • Expert Best Practices For Developing A Coding Style Guide
  • Everything You Need To Know About Semaphores And Mutexes
  • 5 Simple Embedded Software Classifications You Need to Know
  • Embedded Software Trends to Watch in 2023
© 2023 Beningo Embedded Group. All Rights Reserved.
Privacy Policy

GET EXPERT TIPS & ADVICE DIRECTLY FROM JACOB

Sign Up for Exclusive News and Updates

×
 

Loading Comments...