Renesas Electronics
IoT security issue are well known, but not easily addressed. Most security tools use methods developed for our 64-bit laptops, tablets, or smartphones that are not well-suited for the low resource 8-,16- or 32- bit devices that are the foundation of the IoT today. These security methods are also typically computationally intensive—putting both a time-to-compute and energy burden on battery-powered devices. In this webinar, we will learn how the Renesas-SecureRF partnership uniquely delivers a practical and secure identification and authentication solution that meets the easy-to-deploy, low-power requirements of IoT edge nodes.
Watch Now
Organisations have traditionally struggled with deploying and managing the network connectivity solutions needed to power their IoT applications – an endeavor that only becomes more complex on a global scale. With challenges ranging from technology availability and device compatibility, to complex logistical processes and multi-SKU devices and SIMs, to disruptive network shutdowns – there are many factors that must be considered to successfully sustain the required levels of connectivity.
Watch Now
Community
Software increasingly surrounds our daily lives. As the Internet of Things (IoT) grows, it continues to disrupt more markets and industries, and software design and development is the driving force of enablement. Expect significant changes in manufacturing, retail, vehicles, and in your home – the long-term potential is simply incredible. However, trying to maximize IoT in your current design and development process is a huge challenge that may leave some decision makers in disarray.
Watch Now
Silicon Labs
In this webinar, Lars Lydersen, senior director of product security at Silicon Labs, delves into the historical data of how adversary capability has evolved, and discusses how these can be extrapolated into the future. This understanding gives a necessary background to evaluate what security functionality is necessary in an IoT design. Even with advanced security functionality, there will always be unknown unknowns, and it will be necessary to secure against attacks and adversaries of the future.
Watch Now