Upcoming Webcasts Calendar

View Archived Webcasts

Aug
12
2020
Sponsored by: IAR Systems
11AM EDT (in 5 days, 5 hours)
Your IP is essentially the crown jewels of your design, if not your entire company. Hence, it’s vital to ensure that it remains secure. However, it’s not always obvious where the weak link in your protection chain resides. And there’s far more to it than the old adage of “monitor, detect, and respon...
Aug
18
2020
Sponsored by: Advantech
2PM EDT (in 11 days, 8 hours)
AI is transforming industries like manufacturing, retail, smart cities, transportation, healthcare and more. Applications are moving towards edge computing to enable real-time decision making without the limitations of latency, cost, bandwidth, and power consumption. This trend has led to a rapid in...
Aug
19
2020
Sponsored by: IAR Systems
11AM EDT (in 12 days, 5 hours)
Secure contexts define the configuration of the trusted execution environment and ensure that minimum standards of authentication and confidentiality are met. In many cases, APIs are only accessible via a secure context. This is a method of ensuring that your embedded code remains secure and out of...
Aug
26
2020
Sponsored by: IAR Systems
11AM EDT (in 19 days, 5 hours)
Secure Provisioning involves defining a key infrastructure during the development process to dynamically generate secure keys, then insert those keys into the device along with a cryptographically secured application image. That process sounds complex, but it needn’t be if you follow a step-by-step...
Sep
02
2020
Sponsored by: IAR Systems
11AM EDT (in 26 days, 5 hours)
System security often starts with a secure boot process, which is managed by the Secure Boot Manager, which lives alongside the provisioning of secure keys and certificates, to provide a robust root of trust. If your system does not deploy a secure boot mechanism, you’re clearly opening yourself up...

View Archived Webcasts