Best Practices for Embedded Security

Embedded device security is not always a straightforward pursuit. Devices are more complex, more connected, and more numerous. Regulation and legislation also increase the pressure on OEMs to maintain the highest security standards. How can device makers build secure embedded systems, and what role does hardware play? What are the best practices in embedded security, […]

IoT Security Solutions – Trends and Best Practices

In a world dominated by connectivity challenges, time is a luxury. Witekio’s recent webinar, featuring tech experts from Avnet, isn’t just another discussion; it’s a roadmap for decision-makers like you, offering swift solutions to the pain points that often plague OEMs. We delve straight into the experts’ insights on tackling connected solution intricacies in our […]

The Cyber Resilience Act and Device Makers

In an era marked by the rise of IoT devices, device makers face an escalating challenge in safeguarding their products against cyber threats. The Cyber Resilience Act (CRA), emerges as a regulatory game changer, fortifying cybersecurity across the European Union. But what exactly are the ramifications of the CRA for device makers, and how does […]

IoT Ecosystem Security – Webinar Top Takeaways

In the first-ever Witekio – Pentest Limited webinar, we got straight to the very heart of the issue on everyone’s mind – IoT Ecosystem Security. More specifically, how to identify and secure threats on a connected device. With consumers demanding more and more connectivity and integration between devices, security threats are more likely. Therefore, at […]

How to secure your IoT device in the Cloud

There’s little doubt that security is a major concern of almost every IoT device owner, user, and manufacturer. With so many of today’s IoT devices connected to the cloud, security concerns have exploded, and device vendors have been forced to differentiate their products from the competition by pointing to their security bona fides. But what are we […]

Securing your IoT device: a growing concern

How MacGyver Triggered a Reflection on IoT Device Security When I was younger, I used to love watching MacGyver. Back then Richard Dean Anderson’s Angus ‘Mac’ MacGyver was about the coolest guy on TV: he’d get himself into all sorts of dire circumstances, only to figure out a way to survive and bust the bad […]

Security By Design On NXP i.MX 8

How does NXP help IoT makers to secure their devices on i.MX 8? It’s no surprise that in a world where hacks, data leaks, malware, and bad actors regularly make headlines, many in the IoT world are concerned about the security of their devices and networks. A recent survey of 170 IoT industry leaders revealed […]

Secure Boot on NXP i.MX 7

What is Secure Boot in Embedded Systems? Or High Assurance Boot (HAB): why do you need it and what do you need to be aware of? In today’s connected world, IoT devices reach into every phase of modern life. From household appliances to automated cars, smartwatches to smartphones in your pocket, the heap of form […]

TPM: Basic applications to embedded devices

Trusted Platform Module: security of your embedded system, what are the basics, and how to use this with Linux? Nowadays, IoT security is an issue of high concern, whether in companies or personal networks, each connected device plays an important role in sensible data transfer and thus impacts the overall security. That’s where Trusted Platform […]