Several years ago, I was working on a project for a client that involved an embedded Linux machine. I was planning to travel over the...
Read More >>>Category Archives: Security
5 Tips for using Arm TrustZone in Cortex-M Processors
As embedded system developers transition to creating connected, IoT devices, security has become one of the most important issues they face. The ARMv8-M processors do...
Read More >>>5 Technologies Embedded System Engineers Should Master in 2019
Happy New Year! Another year is here and with it are many opportunities for embedded...
Read More >>>7 Tips for Getting Started with TrustZone for MCU’s
The new Armv8-M architecture from arm® with its Cortex®-M23 and Cortex®-M33 processors is quickly gaining steam in the industry. The Armv8-M architecture includes a new...
Read More >>>Webinar – Secure Bootloader Design Techniques for MCU’s
The webinar recording can be accessed at the link below: Watch Recording Download the Slides...
Read More >>>Getting Started using Arm® TrustZone® for Cortex®-M Processors
TrustZone for Cortex-M processors is on the way! There has already been an announcement from...
Read More >>>The first ARMv8-M MCU with TrustZone Support
We’ve been hearing for several years now that Arm Cortex-M processors would soon be getting a security upgrade by supporting TrustZone in the M23/M33 microcontrollers....
Read More >>>7 Tips for Securing an Embedded System
Security, just like quality and many other embedded system attributes must be considered at the start of the development cycle. Developers can’t build their system...
Read More >>>A Guide to Securing your IoT Device using Arm TrustZone for Cortex-M
The webinar recording can be accessed at the link below: Webinar Recording Webinar Description Securing...
Read More >>>Embedded Basics – Hash Fundamentals
Hashes are crucial in computer science and provide a wide range of capabilities and functionality. In addition, hashes play an important role in verifying and...
Read More >>>7 Tips for Selecting a Secure Microcontroller
Developing a secure, connected device that can also operate efficiently requires that developers select a microcontroller that includes specific hardware and software features. These features...
Read More >>>Embedded Basics – The Arm Security Manifesto
Last week I attended Arm TechCon and a major theme through-out was embedded security. During the conference, Arm released their Security Manifesto which provides developers...
Read More >>>