
One of the greatest challenges facing developers creating connected systems is securing their devices. In the good old disconnected days, developers only had to concern themselves with physical tampering but today, systems are also vulnerable to remote attacks that can result in device cloning, repurposing, intellectual property theft, data manipulation and many other potential issues. … Continue reading CEC – Securing IoT Devices using arm TrustZone