Zephyr as a Secure Choice for Embedded MCU Development

The need for robust security in embedded devices has never been more critical. As IoT becomes everyday, vulnerabilities in connected devices become prime targets for cyber threats. Ensuring firmware integrity, secure communication, memory protection, and trusted environments is not just a nice-to-have—it’s essential. In this blog, we explore how Zephyr RTOS provides the foundation for […]

What Yocto Users Need to Know About the Cyber Resilience Act

Yocto CRA

If you’re building embedded Linux devices with Yocto and plan to sell in the EU, the Cyber Resilience Act (CRA) will soon become part of your daily reality. Starting in 2026, vulnerability reporting becomes mandatory. By 2027, full CRA compliance is required for all connected hardware and software products sold commercially in Europe. This blog […]

Why Are U.S. Device Makers Sleeping on Security?

iot device security

Cybersecurity is no longer a future concern—it’s a present-day imperative. As the number of connected devices grows, so does the complexity and severity of the threats they face. What was once a best-effort exercise is rapidly becoming a strict regulatory obligation, especially in Europe and increasingly in the U.S. So why are many U.S. device […]

Best Practices for Embedded Security

Embedded device security is not always a straightforward pursuit. Devices are more complex, more connected, and more numerous. Regulation and legislation also increase the pressure on OEMs to maintain the highest security standards. How can device makers build secure embedded systems, and what role does hardware play? What are the best practices in embedded security, […]

The Cyber Resilience Act and Device Makers

In an era marked by the rise of IoT devices, device makers face an escalating challenge in safeguarding their products against cyber threats. The Cyber Resilience Act (CRA), emerges as a regulatory game changer, fortifying cybersecurity across the European Union. But what exactly are the ramifications of the CRA for device makers, and how does […]

Embedded Yocto Security Hardening

In this connected age, it often feels like every line of code is a battleground, especially when it comes to Embedded Yocto Security. The number of threat surfaces and vulnerabilities a device is subject to seems to grow by the day. That’s why two of our top engineers got together with OTA wizards Mender to […]

IoT Ecosystem Security – Webinar Top Takeaways

In the first-ever Witekio – Pentest Limited webinar, we got straight to the very heart of the issue on everyone’s mind – IoT Ecosystem Security. More specifically, how to identify and secure threats on a connected device. With consumers demanding more and more connectivity and integration between devices, security threats are more likely. Therefore, at […]

Device security from Edge to cloud – SIDO Lyon

Witekio VP of Engineering Marc Balme joined other IoT experts at SIDO Lyon on a panel dedicated to all things security, from edge to cloud. Speakers – Device Security: From the Edge to the Cloud Marc took the stage alongside Cybersecurity Business School founder Guillaume Collard, Sierra Wireless Marketing Director for Mobile IoT Solutions Benoit […]

How to secure your IoT device in the Cloud

There’s little doubt that security is a major concern of almost every IoT device owner, user, and manufacturer. With so many of today’s IoT devices connected to the cloud, security concerns have exploded, and device vendors have been forced to differentiate their products from the competition by pointing to their security bona fides. But what are we […]

Securing your IoT device: a growing concern

How MacGyver Triggered a Reflection on IoT Device Security When I was younger, I used to love watching MacGyver. Back then Richard Dean Anderson’s Angus ‘Mac’ MacGyver was about the coolest guy on TV: he’d get himself into all sorts of dire circumstances, only to figure out a way to survive and bust the bad […]

Security By Design On NXP i.MX 8

How does NXP help IoT makers to secure their devices on i.MX 8? It’s no surprise that in a world where hacks, data leaks, malware, and bad actors regularly make headlines, many in the IoT world are concerned about the security of their devices and networks. A recent survey of 170 IoT industry leaders revealed […]

IoT Security: The Coming Certificapocalypse

From the Internet of Things to the Internet of Trouble: IoT security certificates It all began with a couple of programmers that just wanted a cold Coke. In 1982 computer science researchers at Carnegie Mellon University finally got fed up with making their way up three flights of stairs to find a vending machine that […]

High assurance device security with CAAM encryption keys

The number of embedded systems is growing fast. One of the industries making use of them is the car industry. And Self-driving vehicles are pushing systems to the limits as they are equipped with a lot of sensors, network connectivity and processors based on many heterogeneous specialized SoCs. The number of security vulnerabilities and thus, […]

Secure Boot on NXP i.MX 7

What is Secure Boot in Embedded Systems? Or High Assurance Boot (HAB): why do you need it and what do you need to be aware of? In today’s connected world, IoT devices reach into every phase of modern life. From household appliances to automated cars, smartwatches to smartphones in your pocket, the heap of form […]

Security vulnerability: Spectre in the spotlight

Since Spectre security hack caught the public eye beginning of this year, a lot of noise has been made about it. It raises a lot of questions about the security vulnerability. All major Silicon Vendors have made announcements either about how their processors were not impacted or about why this flaw was so specific that […]

TPM: Basic applications to embedded devices

Trusted Platform Module: security of your embedded system, what are the basics, and how to use this with Linux? Nowadays, IoT security is an issue of high concern, whether in companies or personal networks, each connected device plays an important role in sensible data transfer and thus impacts the overall security. That’s where Trusted Platform […]