www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...

Anchoring Trust to Enhance IoT Security

Without trust, there is no security, and anchoring trust at the hardware level provides the foundation for all secure operations of a computing system.

www.eetimes.eu/, Apr. 20, 2023 – 

The ubiquity of internet-of-things devices gives hackers more points of attack. The European Parliament Research Service predicts that by 2031, there will be a new attack on a consumer or business every two seconds, costing victims about €251 billion a year.

The European Commission has placed cybersecurity at the top of the list of priorities for the EU's long-term budget. In September, the EC presented a proposal for the Cyber Resilience Act that established common cybersecurity rules to bring hardware and software products to market with fewer vulnerabilities. This legislative initiative is part of the EU's "Path to the Digital Decade" for Europe's digital transformation by 2030.

"When it comes to cybersecurity, Europe is only as strong as its weakest link, be it a vulnerable Member State or an unsafe product along the supply chain," said Thierry Breton, commissioner for the Internal Market. "Computers, phones, household appliances, virtual assistance devices, cars, toys ... each and every one of these hundreds of million connected products is a potential entry point for a cyberattack. And yet today, most of the hardware and software products are not subject to any cybersecurity obligations. By introducing cybersecurity by design, the Cyber Resilience Act will help protect Europe's economy and our collective security."

Meanwhile, the European Union Network and Information Security Agency has documented the status of the standardization process for post-quantum cryptography and introduced a framework for analyzing existing quantum security solutions, categorizing them into families and discussing their advantages and disadvantages.

With critical threats ever present and evolving, security never sleeps. Why is post-quantum cryptography important now? What can hardware-based security protect that software can't, and how is hardware root of trust established? How can developers and operators guarantee system reliability over time? How secure are RISC-V chips? How can developers ensure end-to-end security for embedded systems?

click here to read more...

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.