WP_Term Object
(
    [term_id] => 13
    [name] => Arm
    [slug] => arm
    [term_group] => 0
    [term_taxonomy_id] => 13
    [taxonomy] => category
    [description] => 
    [parent] => 178
    [count] => 372
    [filter] => raw
    [cat_ID] => 13
    [category_count] => 372
    [category_description] => 
    [cat_name] => Arm
    [category_nicename] => arm
    [category_parent] => 178
)
            
Mobile Unleashed Banner SemiWiki
WP_Term Object
(
    [term_id] => 13
    [name] => Arm
    [slug] => arm
    [term_group] => 0
    [term_taxonomy_id] => 13
    [taxonomy] => category
    [description] => 
    [parent] => 178
    [count] => 372
    [filter] => raw
    [cat_ID] => 13
    [category_count] => 372
    [category_description] => 
    [cat_name] => Arm
    [category_nicename] => arm
    [category_parent] => 178
)

Securing Your IoT System using ARM

Securing Your IoT System using ARM
by Daniel Payne on 03-14-2017 at 12:00 pm

I’ll never forget reading about and experiencing the October 21, 2016 Distributed Denial of Service (DDoS) attacks which slowed and shut down a lot of the Internet. On that particular attack the target was to shut down the Domain Name System (DNS). Traffic for this massive DDoS attack came from IoT devices which were unsecured digital devices, like home routers and surveillance cameras. Hackers were able to infect these devices with malicious code to form a botnet.

The good news is that semiconductor IP companies like ARM can provide you with a well thought out approach to make your IoT projects secure by design. Consider attending their next webinar, “How to implement a secure IoT system on ARMv8-M“, it’s planned for Wednesday, March 29, 2017 at two different time slots.

Attacks on IoT devices are guaranteed – they will happen! Therefore,system security needs to be easy and fast to implement. With ARM’s newest embedded processors – the ARM Cortex-M23 and Cortex-M33 with TrustZone for ARMv8-M – developers can take advantage of hardware-enforced security. Now, system designers have the challenge to extend security throughout the whole system.

Join this technical webinar with Applications Engineer, Ed Player and IoT Product Manager, Mike Eftimakis. They will showcase what hardware and software you need to design a secure IoT system on ARMv8-M with TrustZone. The webinar will deep dive into an actual IoT system and share some of the products and tools available, to create the most efficient, viable IoT system. During the webinar, ARM will share exclusive, exciting news, which will help you accelerate your next IoT design.

Register for this webinar to learn:

• Hardware design considerations for building security into an SoC.
• Development techniques for generating secure software.
• How ARM TrustZone technology can be used to establish trust and security within an IoT system.

Registration is done online here, and I’ll be attending and blogging about it, so stay tuned.

Share this post via:

Comments

There are no comments yet.

You must register or log in to view/post comments.