The first installment in the Secure Thingz webinar series. Understand the potential of the IoT market and the risks to growth.
The US Federal Trade Commission says companies need to do more to ensure security is built into an IoT-connected product, both in development and manufacturing, and through ongoing updates through a product's life.
Attacks on connected devices will only get worse and more sophisticated, with plenty of potential entry points impacting device security. If an IoT security incident occurs, this paper provides insights into steps to take.
This paper describes how to establish a supply chain of trust, create a root of trust and a solution for secure provisioning and programming of Secure Elements and Secure MCUs.
A look at how to manage keys and certificate structures and enable secure software updates using a secure boot manager.
This presentation outlines a holistic approach to security requirements for IoT devices, including certificate structures and methodology for developing certificate hierarchy.
Currently, few IoT OEMs use root of trust-based hardware when developing their products. With growing visibility of IoT cyberattacks, this white paper introduces secure provisioning and manufacturing.
The “supply chain of trust” includes silicon vendors, embedded software companies, programming solutions providers, and OEMs. This white paper looks at establishing a “zero trust” approach.
The root of trust is the baseline for an IoT device’s trust, and different vendors take different approaches. This white paper outlines the approach of creating a certificate structure in a device.
Data sheet on Secure Thingz’ Secure Deploy™ architecture, the most advanced and integrated solution, to deliver the supply chain of trust.
1065 E Hillsdale Blvd # 420, Foster City, CA 94404, USA | Secure Thingz Ltd, Harston Mill, Harston, Cambridge CB22 7GG
Copyright © 2018 SecureThingz. All rights reserved.