How To Protect Your Firmware: 5 Mistakes To Avoid

Lock with digital icons projected on top

By: Joe Schneider
You put a massive amount of time, energy, and cost into developing your firmware. As such, protecting your firmware should be a top priority. Avoiding these 5 mistakes will help ensure your firmware stays secure.

Trusting the Docker Images Your Code is Built On

We’ve written before about the benefits of using Docker in your development environments. You don’t have to write every image yourself, though! There are many existing images on Docker Hub […]

Device Updates: Cut Down Time and Data Usage

Updating your hardware in the field

Have you ever suspected that the way updates are handled on your embedded devices wastes electricity, drives up customer cellular data bills or takes longer than really needed? Let’s look at how device updates have traditionally been done…

10 Pillars of Modern Embedded: Pillar 8–Security

Cyber security concept ,computer network and communication,System administrator working in laptop for develop software of data protection from hacker to protect the critical information and reduce the vulnerability in their network

Security is not a feature, it is a framework. You build your system around this framework. Every design decision, every architectural component, every path on the PCB and every line of code should consider this. Modern systems need to put it front and center.

Secure Boot – What Is It?

Lit up circuitry on transparent board

Secure Boot Secure Boot is a security standard for devices used during the boot process to ensure only software that is created and trusted by the manufacture is executed. In […]

Protect Your Security Keys Using git-secret

Development teams, especially those working remotely or spread across different company locations can run into a problem when they need to store sensitive files for the team to use but […]