Security

Lock with digital icons projected on top

How To Protect Your Firmware: 5 Mistakes To Avoid

February 21, 2023

By: Joe Schneider
You put a massive amount of time, energy, and cost into developing your firmware. As such, protecting your firmware should be a top priority. Avoiding these 5 mistakes will help ensure your firmware stays secure.

Read More
Updating your hardware in the field

Device Updates: Cut Down Time and Data Usage

July 30, 2021

Have you ever suspected that the way updates are handled on your embedded devices wastes electricity, drives up customer cellular data bills or takes longer than really needed? Let’s look at how device updates have traditionally been done…

Read More
Lit up circuitry on transparent board

Secure Boot – What Is It?

December 4, 2020

Secure Boot Secure Boot is a security standard for devices used during the boot process to ensure only software that is created and trusted by the manufacture is executed. In…

Read More
Futuristic tunnel with overlays of charts and symbols

10 Easy Steps to Add Static Analysis to Your Firmware Build

October 27, 2020

  When it comes to embedded system applications, security is one of the most important requirements. In addition to embedded security topics such as Bluetooth encryption, SSH, and TLS, modern…

Read More
Laptop with some code on screen

Trusting the Docker Images Your Code is Built On

July 24, 2020

We’ve written before about the benefits of using Docker in your development environments. You don’t have to write every image yourself, though! There are many existing images on DockerHub and…

Read More
Locked chain on a fence

Protect Your Security Keys Using git-secret

July 22, 2020

Development teams, especially those working remotely or spread across different company locations can run into a problem when they need to store sensitive files for the team to use but…

Read More