Security

  • The Ultimate Cyber Security Survival Guide: Best Practices to Follow

    The Ultimate Cyber Security Survival Guide: Best Practices to Follow

    The number of crimes related to the unauthorized use of personal data on the Internet is increasing. Cybersecurity Ventures predicted that cybercrime will cost the world $6 trillion annually.

    Read Article
  • Embedded Executives: David Kleidermacher, VP of Engineering, Head of Android Security and Privacy, Google

    Embedded Executives: David Kleidermacher, VP of Engineering, Head of Android Security and Privacy, Google

    The Internet of Secure Things Alliance (IoXT) is pushing a common (and obvious) goal for our industry. They want to keep all of our connected devices secure.

    Read Article
  • Think Local: How to Migrate Intelligence from the Cloud to Embedded Devices at the Edge

    Think Local: How to Migrate Intelligence from the Cloud to Embedded Devices at the Edge

    Adding more cloud compute won’t solve the problem of managing exponentially growing quantities of data for IoT devices. We need to shift much of the “thinking” from the cloud to endpoint devices...

    Download PDF
  • Why IoT Solutions Need Hardware-Based Security

    Why IoT Solutions Need Hardware-Based Security

    This paper highlights why a software approach to IoT security implementation can no longer meet acceptable levels of assurance and protection and explains the reasons why a hardware-based approach...

    Download PDF
  • IAR Releases New Version of IAR Embedded Work Bench based on Renesas RX MCUs

    IAR Releases New Version of IAR Embedded Work Bench based on Renesas RX MCUs

    IAR Systems released its newest version the functional safety edition of IAR Embedded Workbench for Renesas’ RX Family of microcontrollers (MCUs).

    Read Article
  • VARTA Showcases Battery Solutions Portfolio at embedded world

    VARTA Showcases Battery Solutions Portfolio at embedded world

    VARTA Microbattery's trade fair presentation focused on Nickel-Metal Hydride cells, Lithium coin cells, and Lithium-Ion coin cells (microbatteries) as energy supply for applications in the IoT.

    Read Article
  • On-Demand Training Available – Topics include Machine Learning, Security, Motor Control and So Much More!

    NXP is excited to bring you the NXP eXperience – an online and interactive destination for all our news, content and training as it was originally planned for the show.

    Read Article
  • Embedded Executives: Mike Nicholson, Embedded Software/Systems Architect, MultiTech

    Embedded Executives: Mike Nicholson, Embedded Software/Systems Architect, MultiTech

    In this week's Embedded Executives, Rich Nass is joined by Mike Nicholson, Embedded Software/Systems Architect, MultiTech.

    Read Article
  • How to secure network equipment using Infineon OPTIGA™ TPM hardware-based security solutions, the TPM Software Stack and Lanner security exp

    How to secure network equipment using Infineon OPTIGA™ TPM hardware-based security solutions, the TPM Software Stack and Lanner security exp

    Computers, servers and the people that operate them used to be the primary target of attackers. Today, because of increasing connectivity and dependence on networks, network equipment has become...

    Download PDF
  • The Role of Static Analysis in Management of Cybersecurity in Medical Devices

    The Role of Static Analysis in Management of Cybersecurity in Medical Devices

    This paper describes how static analysis plays a key role in risk management of medical device software development.

    Download PDF
  • Enhancing Code Reviews with Static Analysis - GrammaTech

    Enhancing Code Reviews with Static Analysis - GrammaTech

    This paper discusses how static analysis tools provide an ideal (and automated) companion to code reviews by supporting the process and increasing the defect removal rate.

    Download PDF
  • DevSecOps - Integrating Static Application Security Tools (SAST) in DevSecOps

    DevSecOps - Integrating Static Application Security Tools (SAST) in DevSecOps

    This paper takes a look at the role of static application security testing tools (SAST) and in particular GrammaTech CodeSonar and how it can be used in DevSecOps and continuous development pipelines

    Download PDF
  • IoT Security Top 20 Design Principles

    IoT Security Top 20 Design Principles

    IoT Security Top 20 Design Principles

    Download PDF
  • Security Awareness

    Security Awareness

    Systems today are more connected than ever before, increasing not only the “attack surface” but the motivation for an attack itself. How is your company addressing securing for your connected systems?

    Download PDF
  • IAR Systems Updates its Security Development Tool C-Trust

    IAR Systems launched a new version of its security development tool C-Trust.

    Read Article
  • Medical Device Safety and Security: Obvious but not easy to achieve

    Medical Device Safety and Security: Obvious but not easy to achieve

    With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two...

    Download PDF
  • Why the Security Market is Taking a Closer Look at the Use of Radar Sensors as Opposed to the Popular Passive Infrared (PIR)

    Radar technology is an excellent contender to PIR, as it offers added capabilities. PIR has certain limitations that are not desirable in the security market for which radar detection can overcome.

    Read Article
  • OmniVision Expands Nyxel NIR and ULL Sensor Resolution to 4 MP

    OmniVision Expands Nyxel NIR and ULL Sensor Resolution to 4 MP

    OmniVision Technologies released the OS04A10, a 2.9-micron pixel image sensor with 4-megapixel (MP) resolution, adding to the Nyxel family of near-infrared (NIR) and ultra-low light (ULL) sensors.

    Read Article
  • AMG Systems Releases Mini Media Converter for Security and Transport Applications

    Housed in a mini chassis, AMG’s new Mini media converters are ideal for connecting field-based equipment to Ethernet networks over long distances via fiber.

    Read Article
  • Take the Steps to Secure Your Software Supply Chain – What are You Waiting For?

    Take the Steps to Secure Your Software Supply Chain – What are You Waiting For?

    Learn how binary scanning is emerging as a critical activity for securing the complex software supply chain that exists in vehicles.

    Download PDF
  • loading
    Loading More...