Protecting Customer Devices in Smart Homes with Trusted Execution Environments
Recent Cyber Threats in Smart Homes: A Wake-Up Call Before diving into the importance of cybersecurity in smart homes, it's crucial to understand the real-world risks with two recent examples:Smart Thermostat Hack: In a notable incident, hackers gained control over
Trusted Computing Base
Trusted Computing Base A Trusted Computing Base (TCB) comprises all parts of a computing system that provide a securing operating environment. The TCB extends beyond system software and can include the underlying hardware, firmware used for booting and other purposes,
Secure-by-Design – What it really means
Secure-by-Design – What it really means For decades, device security took a back seat to considerations of feature/functionality – responsiveness, connectivity, UX, etc. – and to protecting OEM intellectual property. Architects and developers typically deferred the issue of cybersecurity to
Enterprise vs. Embedded Security
How is embedded security unique? Not a week goes by without news of breaches and exploits that expose corporate networks and regular end-users to risks to data, identity, and more broadly, well-being. With the increasing sophistication of both computer systems
-
Secure-by-Design – What it really means
June 19, 2023 Blog -
Enterprise vs. Embedded Security
June 19, 2023 Blog -
Meet ProvenRun at FIC 2023
April 4, 2023 Events -
ProvenRun at Embedded World 2023
March 3, 2023 Events -
ProveRun will be exhibiting at IoT Solution World Congress 2023
January 23, 2023 Events