Phosphorus partnered with Dewpoint to Expand Its xIoT Security Solutions

Phosphorus partnered with Dewpoint to provide value-added reseller (VAR) services for Phosphorus in the US. Dewpoint, an IT, and security solutions provider will jointly deliver a new generation of xIoT security solutions in the US to meet growing enterprise demand for xIoT attack surface management and remediation capabilities. 

Kal Gajera, Director of North America Channels at Phosphorus commented, “xIoT security is a critical need for today’s enterprises, and these risks are left unaddressed by traditional IT security solutions. We look forward to working with Dewpoint to help expand our US sales channels and bring the world’s most advanced xIoT security platform to more organizations.” 

The Extended Enterprise xIoT Security Platform from Phosphorus is an automated security platform that can provide xIoT Attack Surface Management, xIoT Hardening, and Remediation, and xIoT Detection and Response for the entire range of IoT, OT, and Network-connected devices, including both new and legacy devices. 

This enables big businesses to scale xIoT technologies (which can result in millions of devices per organization) without having to hire more staff to locate, maintain, and keep an eye on them. 

Phosphorus Cybersecurity® is xTended Security of ThingsTM platform created to protect the rapidly expanding and frequently unmonitored Things throughout the enterprise xIoT landscape. Its extended enterprise xIoT Security Platform offers attack surface management, hardening & remediation, and detection & response to extend enterprise xIoT security to all cyber-physical things in your enterprise environment. Phosphorus automates the remediation of the largest IoT, OT, and network device vulnerabilities, including unknown and inaccurate asset inventories, outdated firmware, default credentials, risky configurations, and out-of-date certificates. 

Phosphorus announces partnership with EverSec Group!

Phosphorus announced a collaboration with EverSec Group to expand IoT attack surface management. In order to fulfill the growing enterprise need for xIoT attack surface management and remediation capabilities, the two companies will jointly deploy a new generation of xIoT security solutions in the United States under the new alliance.  

“This exciting collaboration with a proven solution provider will allow us to expand our footprint and deliver cutting-edge xIoT security to more companies across the U.S.,” said Obbe Knoop, Chief Revenue Officer of Phosphorus. “EverSec’s proven expertise in the emerging security landscape is of great value to us as we gear up for record growth this year.” 

The world’s first and only automated security platform, Phosphorus’ Extended Enterprise xIoT Security Platform offers xIoT Attack Surface Management, xIoT Hardening and Remediation, and xIoT Detection and Response to the full spectrum of IoT, OT, and Network-connected devices, including both new and legacy devices. This makes it possible for big businesses to scale xIoT technologies—often millions of devices per business—without needing to hire more staff to safeguard them. 

About Phosphorus and EverSec Group! 

Phosphorus Cybersecurity, the foremost xTended Security of ThingsTM platform was created to secure the constantly expanding and frequently unmonitored Things across the enterprise xIoT environment. In order to provide enterprise xIoT security to every cyber-physical Thing in the company environment, the Extended Enterprise xIoT Security Platform offers Attack Surface Management, Hardening & Remediation, and Detection & Response. 

Around 200 clients wherein most of them are the biggest brand names in the world, rely on EverSec Group as their trusted security expert. To secure the security of its targeted environments, EverSec assists the Network/Infrastructure Security, Cyber, IR, InfoSec, and Security Operations Center teams across those customers. 

Read More : The definitive guide to IoT security best practices

The definitive guide to IoT security best practices

In an Internet of Things (IoT) ecosystem, multiple devices can be connected to the internet and each other to process data and send it over a network. But no one can discuss the IoT without considering how to keep it safe and secure. This is where the idea of IoT security comes in. IoT security is the practice of ensuring that IoT devices and connections are secure. Organizations can do this in several ways, such as keeping software up to date, using good password practice, or buying vulnerability management tools.

In this blog, we will talk in-depth about IoT security, its meaning, the challenges, and what tools can be used to protect it.

IoT security challenges

Organizations are finding it more challenging to keep devices secure as the number of connected devices grows. IoT devices are enticing targets for fraudsters because they are fraught with vulnerabilities and offer an attack surface ripe for security breaches. When managing, monitoring, and safeguarding the connected IoT settings, no matter how established an organization’s IoT network is, all confront the same difficulties.

Cyberthreats have become a significant issue for IoT systems; the need for IoT security is imminent. We have already discussed concerns about IoT security in our last blog, “Major concerns of IoT security.” IoT threats can have both virtual and physical impacts, especially in the industrial internet of things (IIoT) field, where previous cyberattacks have already demonstrated cascading effects on both devices and the stored data.

Standardization

The IoT market is rapidly expanding, and while the majority of IoT solution providers are building all components of the stack, there is a lack of consistency and standards across the services used by various IoT solutions.

Retrofitted legacy devices

Many Organizations rely on legacy equipment to function properly. Nonetheless, with rapid advances in automated and connected technologies, managing both new and old equipment simultaneously can be challenging.

Legacy devices that do not connect to the internet have little or no security. As a result, even if the additional sensors provide some level of security, the device opens new avenues for malicious parties to infiltrate the sensor.

Unauthorized firmware

Unsigned firmware on peripheral devices can expose IoT systems to attacks, allowing hackers to install stealthy and persistent malware, steal valuable data, or take control of a computer.

Devices with unsigned firmware are an easy target for malicious actors to install their firmware on and abuse it for various purposes.

Hardcoded passwords

Hardcoded passwords are risky because they are easy targets for password guessing exploits, which allow hackers and malware to hijack firmware, devices, systems, and software. The same hardcoded password, or a subset, is frequently used across all applications or devices. As a result, if a hacker knows the default password, they may be able to access all similar devices or application instances.

Unprotected and shared keys

Many IoT devices employ symmetric encryption, which employs a single key to encrypt and decrypt data. Data encryption adds an extra security layer over hardcoded or defaults passwords, but sharing and storing the encryption key introduces risk. Because a malicious party can use the key to encrypt and decrypt data, access the entire system, and share data if it intercepts it.

Weak cryptography

Encryption provides impenetrable security, but only when done correctly. The encryption strength is determined by the algorithm used to generate the public/private keys. To generate encryption keys, many IoT devices use weak algorithms that do not adhere to these standards. When this happens, it’s easier for malicious parties to determine the private key, allowing them to compromise the device.

Need of security standards

The advanced IoT devices have made their way into all industries, making it more convenient and efficient while also increasing the amount of data that is shared.

If IoT devices aren’t correctly secured, consumers, businesses, and government entities can all be at risk from cyberattacks. The manufacturer must ensure that the products they sell are as secure as possible at the point of sale. However, the importance of security measures varies naturally among businesses.

Until minimum IoT security standards and a code of practice for consumer IoT security are established and regularly updated to reflect emerging threats, we cannot assume that every IoT device is secure.

IoT devices worldwide will remain vulnerable to security breaches without industry-wide security standards and best practices.

IoT systems face numerous challenges, but these obstacles can only be overcome with a consistent and committed approach to IoT security at all process stages. Organizations must prioritize the creation of trusted device identity, data confidentiality, and the integrity of the data and firmware running on each device. These goals require critical security components such as authentication, encryption, and code signing.

Unique credentials for each device

Sending secure data is a critical function of any IoT device. To be effective, users and manufacturers should trust that the data they receive is genuine and intended for them. The best way to accomplish this goal is to provide each IoT device with unique credentials in the form of digital certificates.

Giving each device a unique digital certificate improves authentication and provides significantly more security than the current practice of using default passwords or even shared keys for symmetric encryption. This is due to the high risk of password compromise and symmetric encryption keys while providing more protection than default passwords.

Code signing to validate firmware and software updates

Hackers can easily push malicious software updates to connected devices; manufacturers can mitigate the risk by requiring devices to validate the authenticity of new firmware or software before installing it.

Development teams can sign their code with a digital signature, which can be accomplished using a public/private key pair. Each connected device would need a public key corresponding to a private key held by the manufacturer’s development team. If the developers “sign” their code with the private key, any device with the public key can confirm that the update was sent from the manufacturer and that it was not modified in transit.

Organization-specific Root of Trust (RoT) map

The root of Trust (RoT) contains encryption keys and aids initial identity validation when new keys or digital certificates are issued. By implementing an organization-specific RoT, manufacturers can gain complete control over identity validation for any device or person to issue an encryption key. Instead of using a shared root and trusting third party’s trust model and operations, keeping the RoT organization-specific allows manufacturers to set their standards for identity verification to create a robust chain of trust.

Monitor and Maintain

All these initiatives necessitate ongoing lifecycle management; any static system is inherently insecure. Without proper lifecycle management, the digital certificates, key pairs, and RoT will deteriorate over time. Organizations need to map everything in use to keep an accurate inventory of what is created and required. They should monitor all certificates, keys, and the RoT to identify potential threats and to ensure quick adjustments. They should regularly maintain the security’s health by regularly updating certificates, keys, and the RoT and revoking any certificates and keys when the relevant devices are no longer in use.

The security concerns provided by IoT hardware and software must be addressed by businesses to reap the benefits of IoT devices. They must also try to safeguard their devices, networks, and data.

These processes involve appropriate discovery and classification of all IoT devices on a network, continuous tracking of device behavior, risk assessment, and segmentation of susceptible and mission-critical devices from other IoT components.


MediaTek Uses Intel Foundry Services for Manufacturing Chips

MediaTek recently join hands with Intel to make chips utilizing Intel Foundry Services’ (IFS) process technologies. The partnership is intended to assist MediaTek in building a supply chain by adding a new foundry partner with capacity in the US and Europe.

Randhir Thakur, President, IFS, stated, “As one of the world’s leading fabless chip designers powering more than 2 billion devices a year, MediaTek is a terrific partner for IFS as we enter our next phase of growth. We have the right combination of advanced process technology and geographically diverse capacity to help MediaTek deliver the next billion connected devices across a range of applications.”

MediaTek utilizes Intel process technologies to build numerous chips that can be used in a variety of smart edge devices. IFS provides a manufacturing platform based on technologies that are optimised for high performance, low power, and always-on connectivity and that are built on a roadmap that extends from next-generation technological advancements to production-proven three-dimensional FinFET transistors.

To address the demand for semiconductor production capacity around the world, IFS established its roots in 2021. With a combination of process and packaging technology, an IP portfolio, and capacity in the US and Europe, IFS sets itself apart from other foundry solutions. The benefits of Intel’s plant expansions at current locations as well as its plans for additional investments in greenfield sites in Germany and Ohio will be felt by IFS customers.

NS Tsai, Corporate Senior Vice president of Platform Technology & Manufacturing Operations at MediaTek, commented, “MediaTek has long adopted a multi-sourcing strategy. We have an existing 5G data card business partnership with Intel, and now extend our relationship to manufacturing smart edge devices through Intel Foundry Services. With its commitment to major capacity expansions, IFS provides value to MediaTek as we seek to create a more diversified supply chain. We look forward to building a long-term partnership to serve the fast-growing demand for our products from customers across the globe.”

Read More: Major Concerns of IoT Security in 2022

Kudelski IoT Launched Secure IP

Kudelski IoT introduced the Secure IP portfolio, which provides semiconductor manufacturers with strong cryptographic capabilities when integrated into system-on-chip (SoC) products. Enterprises benefit from a diverse set of security services that are more powerfully integrated with hardware than software while also enabling compliance with most common industry security standards, such as NIST, FIPS, PSA, and SESIP Level 3 or higher.

Frédéric Thomas, CTO of Kudelski IoT, commented, “We see increasing regulation and demand for security in almost every IoT market, ranging from consumer IoT, automotive, industrial, telco, medical, and asset tracking. We foresee that regulation will require hardware IP in most SoC designs going forward, and through this launch, we are giving silicon manufacturers a head start on preparing for the coming wave of demand.”

Kudelski IoT Secure IP is a hardware security enclave that gives SoCs key features like a high-quality and robust random number generator, secure key storage, robust cryptographic algorithms, and countermeasures against side-channel attacks (SCA, DPA) and fault attacks (DFA). With a smaller footprint, it saves space in SoC designs and energy.

Secure IP also provides access to services and features that ensure the longevity and profitability of devices and solutions for SoC manufacturers, device manufacturers, and end users. It offers features like secure firmware over-the-air updates, remote feature authorization, advanced data encryption to ensure privacy, and zero-touch or in-field provisioning for secured and scalable operations.

In conjunction with Kudelski IoT keySTREAM, secure IP can be used to manage the device lifecycle and provide customers with a fully secure chip-to-cloud experience. Personalization, key provisioning in the factory and the field, secure firmware updates, and attestation are all part of the process, from IoT solution design to refurbishment. As a result, Kudelski IoT wholeheartedly supports the development of secure and long-lasting products that safeguard new business models, corporate reputation, and regulatory compliance.

Michela Menting, Digital Security Research Director at ABI Research, stated, “Silicon hardware-based security offers better protection from manipulation and interference than its software-based counterpart because it’s more difficult to alter or attack the physical device or data entry points.”

Read more Blogs:

Major Concerns of IoT Security in 2022

Senet and Eclypses Partners to Help Secure Business Infrastructure

Senet and Eclypses have announced a partnership to provide advanced FIPS 140-3 validated security solutions to the Internet of Things ecosystem. Senet customers can now purchase Eclypses’ enhanced digital security as an integrated component of Senet’s network services. Eclypses also provides IoT device manufacturers the option of enabling MTE security at the point of manufacture or via a firmware update.

Eclypses’ patented MTE technology is curated to meet the needs of highly scalable, low-power, widely dispersed IoT endpoints. It also provides additional security for critical infrastructure and critical business applications. MTE leverages the Eclypses Cryptographic Library (ECL) to offer enhanced end-to-end security capabilities such as endpoint connection verification and uniquely protected data packets with no change to the user experience and minimal impact on the system resources.

Bruce Chatterley, CEO of Senet stated, “Senet has a committed history of augmenting the already strong LoRaWAN security capabilities through integrations with world-leading security solution providers. With device and data security increasingly becoming a leading topic of discussion with utility, municipal, and large enterprise customers, we are pleased to be partnering with Eclypses to offer the latest innovations in security designed for highly scalable IoT solutions and environments.”

Eclypses takes a proactive approach to take IoT data security to the highest level in anticipation of all threats, unlike other solutions that stop monitoring. ECL (Eclypses Cryptographic Library) is a FIPS 140-3 cryptographic library that provides consistent security for all offerings across all platforms. MTE (MicroToken Exchange) is a Patented technology that uses ECL to randomize and replace data with random streams of values, and MKE (Managed Key Encryption) uses ECL to randomize and MTE-generated encryption keys are used to encrypt data.

David Gomes, COO of Eclypses, commented, “With billions of IoT devices already connected and billions more due to be deployed in the next few years, having a well-defined security strategy is a must for device manufacturers and network operators and end-users alike. Senet is an established leader in the LoRaWAN ecosystem, and we’re excited to be collaborating to deliver enhanced security options to one of the fastest-growing segments of the IoT market.”

Read more blogs:

Major Concerns of IoT Security in 2022

Major Concerns of IoT Security in 2022

IoT Security focuses on protecting connected devices and networks on the Internet of Things systems. The Internet of Things (IoT) is a network of physical objects outfitted with sensors, software, and other technologies that can communicate and exchange data with other devices and systems. IoT systems’ architecture consists of wireless networks, cloud databases for communication, sensors, data processing programs, and smart devices that are interconnected and interact closely with each other.

IoT Systems have equipped big industries and regular users with smart technologies to help ease their requirements. Industrial IoT (IIoT) is revolutionizing the manufacturing landscape with a network of connected machines, systems, and devices allowing manufacturers to plan, control, integrate, and analyze their processes in a more efficient manner.

With the IoT implementation, manufacturers can have potential opportunities to improve operations, enhance customer experience, and strengthen the supply chain connectivity and the data generated by it. Wireless IIoT sensor data is being used by organizations to predict and alert workers when a machine requires maintenance and eventually reduces costly breakdowns and repairs while increasing machine uptime.

GPS systems, RFID tags, and other wireless technologies are being leveraged to track the location of assets at any time with better efficiency.

According to Infosecurity Outlook Experts, “The term IoT is increasingly making its way into everyday use. However, the internet of things (IoT) has become so large that security development has had to keep up with the transforming environment.”

IoT Security is essential for data security, Smart devices gather a lot of sensitive data, including personally identifiable information. These sensitive data breaches can result in unpredictable damages.

Major Security Concerns in IoT

With increasing IoT implementations, users face many concerns regarding privacy and security. IoT systems are increasing exponentially in most of the industry vectors. Devices connected to IoT are growing at an ever-increasing rate daily. Autonomous and intelligent factories are becoming more and more connected in the industry.

Hyperconnectivity across platforms, networks, apps, and devices necessitates protection measures commensurate to the devices’ intelligence and behavior.

IoT security refers to the technology that protects linked devices, networks, and data. Interconnected computing devices, mechanical and digital equipment, objects, animals, and/or humans are all part of the IoT. Each “thing” has a unique identifier and the ability to transport data over a network for identification purposes autonomously. If devices are not properly safeguarded while connected to the internet, they are vulnerable to a wide range of threats.

Because of a series of high-profile cases involving the infiltration and attack of a more extensive network using a typical IoT device, there has been an increased focus on IoT security. Networks having IoT devices attached to them need to be safe. There are a wide variety of tactics, strategies, protocols, and activities that can be used to protect modern enterprises against ever-increasing IoT risks.

Why IoT security?

IoT security offers required measures to safeguard devices that are linked to the internet or a network. An ever-expanding range of applications has made the Internet of Things (IoT) an ever-expanding phrase. Everything from watches to thermostats to video gaming consoles can connect to the internet or other devices.

Internet of Things (IoT) security encompasses a wide range of approaches, strategies, and solutions to prevent these gadgets from being hacked. IoT devices are more vulnerable to hacks because of their inherent connectivity. Some of the key concerns are:

  • Software and Hardware vulnerabilities:

Smart IoT Devices have limited computing power and are resource-constrained, they cannot support powerful security functions and are more vulnerable. The IoT industry lacks the computational capacity for efficient built-in security and poor access control in IoT systems and a limited budget for proper testing and improved firmware security.

IoT systems lack regular patches and updates due to limited budgets and technical limitations. IoT Devices have poor protection from physical attacks and an attacker can get close enough to add their chip or hack the device using radio waves. Malicious actors can leverage vulnerabilities in IoT systems to install malware and steal valuable data.

For example, the use of vulnerable credentials like weak, recycled, and default passwords helps hackers to hack smart cameras and they can even communicate with victims remotely using the camera’s microphone and speakers.

  • Data Security:

All the devices connected to the internet have high chances of online exposure. These devices can unknowingly store and affect sensitive, technical, and even personal information. IoT devices have access to the financial information of their users also. When these devices have access to your credit card or banking information, they become an easy target for hackers.

Financial institutions that use IoT at work are at elevated risk of exposure and attack. IoT devices with sensitive financial information and weak security can put both businesses and customers at risk.

  • Ransomware:

Ransomware and malware are serious threats to IoT systems. Cybercriminals have leveraged malware to great extent in recent years. Devices with insufficient enterprise cybersecurity can become a target for ransomware, which encrypts and blocks access to users’ sensitive files. The real trouble begins when a hacker who infected the device with malware demands ransom money. These security threats could jeopardize wearable technology, healthcare trackers, and smart homes.

The rapid rise in the number of IoT devices is making the security issue volatile. However, because the majority of IoT information is stored in the cloud, this malware may not have valuable data to lock. Ransomware attacks have the potential to not only lock users out of IoT devices and related platforms but also to disable devices and steal users’ data.

IoT botnet malware is one of the most common threat actors because it is versatile and profitable for cybercriminals.  Botnets are networks of devices that run malicious bots and distribute malware. Botnets can infiltrate IoT networks and install ransomware, spyware, or other malware on secure devices, jeopardizing your financial and personal security.

  • Cyberattacks:

Cyberattacks on IoT systems have dangerous consequences as they can easily turn into physical ones like fraudulent withdrawal of money or misuse of personal information or data. Cyberattacks like Distributed denial-of-service (DDoS) attacks frequently leverage infected or hijacked IoT devices. These devices are used as an attack base to infect additional machines and hide malicious activity, or as an entry point for lateral movement within a corporate network.

Be it organizations or smart homes, all IoT systems are at equal risk of cyberattacks. IoT systems are used in various industries from finance to healthcare, and an attack on these systems can expose sensitive information or even endanger their health and safety.

Conclusion

The Internet of Things has the unique ability to affect both virtual and physical systems. Developing a secured and safe IoT environment is the need of the hour. Users must regularly check for updates and patches and be ready to adapt to the developing IoT security protocols. In this blog, we shed some light on the concerns of IoT system security, further aspects like solutions for IoT Security will be discussed in the upcoming series on this topic.

Read more blogs:

What is IoT Security?

Impinj Launched E910 Rain RFID for IoT Enterprises

Impinj recently unveiled the Impinj E910 RAIN RFID reader chip for next-generation enterprise-grade readers that can find and interact with many connected objects, including retail clothing, pallets, airline baggage, and automobile parts. The Impinj E910 reader chip provides the industry-leading performance, low power consumption, and user-friendliness required for loss prevention, inventory management, and supply-chain automation solutions.

Chris Diorio, Impinj co-founder, and CEO stated, “The Impinj E910 reader chip will shepherd in a new era of RAIN RFID applications that connect trillions of everyday items. The E910 is the most highly integrated, easy-to-use, and sensitive reader chip on the market today, unlocking enterprise RAIN RFID applications in retail, supply chain and logistics, automotive, aviation, and myriad other market segments and opportunities.”

The Impinj E910 offers the highest receive sensitivity for any reader chip, -94 dBm, allowing reader manufacturers to meet the speed and distance requirements of demanding RAIN RFID applications like fast-moving conveyors and high-bay warehouse rack systems.

The high-performance E910 simplifies IoT device development by expanding Impinj’s existing E family of reader chips, which includes the E710, E510, and E310. These chips, when combined, provide advantages over previous-generation Impinj Indy reader chips, including, RAIN RFID system designs that are up to 80% smaller and are ideal for small, next-generation readers and IoT devices.

It supports battery-powered, energy-efficient readers and IoT devices by lowering chip power consumption by 50%. Software and pin-compatible designs allow simple performance upgrades and design reuse across the E family of chips.

Impinj partners can accelerate new reader innovation with simple developer tools and a new Impinj R515 reader reference design. The reference design includes extensive documentation and engineering drawings to assist IoT device manufacturers in maximizing the capabilities of the Impinj E910 reader chip in their readers while also reducing time-to-market. The Impinj E910 is a step forward for the Impinj platform, which includes RAIN tag chips, reader chips, readers, and Impinj’s partner ecosystem.

Read more articles:

What is IoT Security?

Laird Connectivity Launched Summit Suite for Device Protection

Laird Connectivity launched Summit Suite, a new value-added software service with critical security features and services to reduce risks and threats throughout the product lifecycle. Laird Connectivity provides best-in-class wireless engineering services. Summit Suite enables Laird’s customers to streamline the device protection process. Customers can select IoT hardware from Laird Connectivity and combine it with multiple layers of security software and enterprise connectivity from a single source. Customers can manage all aspects of the security lifecycle by using the Summit Suite.

Dan Kephart, Senior Product Manager at Laird Connectivity commented, “Summit Suite is built on our expertise from decades of partnership with medical and industrial device makers. The goal of the Summit Suite portfolio is to simplify the process of protecting devices and give our customers the flexibility to choose the security features that are the right fit for their products and end applications.”

Summit Suite has four major components: FIPS Cryptographic Modules, Chain of Trust Device Security, Software Vulnerability Monitoring and Remediation, and Secure Connectivity.

The FIPS Cryptographic Modules enable Laird’s customers to avoid building a FIPS solution from scratch. It saves years of learning, testing, and development time, as well as the 18+ months required to validate a FIPS module. Customers can enable Wi-Fi communications while also providing end-to-end TLS data-in-transit and data-at-rest for government agencies and private enterprises that require FIPS validated cryptography.

Chain of Trust Device Security eliminates the burden of developing a device security architecture, implementing new secure manufacturing processes, and developing a secure application for device image signing and key management. Laird Connectivity goes beyond industry standards to protect IP and user information. It reduces time to market by combining a device security architecture, large-scale manufacturing key programming, and a secure imaging signing service from a single source.

Software Vulnerability Monitoring and Remediation ensures that the device hardware has a solution for BSP security lifecycle management from start to finish. Laird Connectivity provides long-term support for BSPs, as well as regular CVE scanning and reporting that alerts customers to known BSP vulnerabilities, as well as BSP vulnerability remediation and mitigation.

Summit Suite Secure Connectivity is an enterprise-grade software suite that unlocks the full Wi-Fi potential of select product families, such as the Summit 60, 60 Series SOM, Summit SOM 8M Plus, IG60, and future product lines. Laird Connectivity has proactively upgraded support from the current industry standard WPA2-Enterprise and TLS 1.2 to the next generation WPA3-Enterprise and TL 1.3, ensuring that the Wi-Fi security of these product families remains ahead of enterprise Wi-Fi network industry trends.

Read more articles:

What is IoT Security?

API Security Should Be Your Priority in 2022

Microchip Launched Arm Cortex-M23 Microcontroller

Microchip Technology launched a microcontroller that integrates a secure subsystem and Arm TrustZone technology into a single package. Microchip Technology is a leading provider of smart embedded control solutions, that are connected and secured. Its simple development tools and extensive product portfolio enable customers to create optimal designs, lowering total system cost and time to market.

Security threats are becoming more complex, posing challenges to product development in the Internet of Things (IoT), consumer, industrial, medical, and other markets. It is needed that these products must have strong embedded security while also consuming little power to allow for longer battery life.

Rod Drake, Vice President of Microchip Technology’s 32-bit MCU business unit, stated, “With its integration of Arm TrustZone technology and Microchip’s secure subsystem in one package, the PIC32CM LS60 is an offering that the market hasn’t seen before. We believe this MCU’s security, ease of use, and low-power operation will be a powerful shift in implementing advanced security technology in IoT applications.”

The need for secured edge devices with high standards of protection has become critical as the IoT industry is rapidly growing. The PIC32CM LS60 enables developers to implement industry-proven security practices and countermeasures to protect against a wide class of known remote and physical attacks through its easy-to-use Arm TrustZone technology and the Common Criteria Joint Interpretation Library.

The PIC32CM LS60 integrates an enhanced peripheral touch controller with the Driven Shield Plus feature, which prevents false touches due to moisture and provides high immunity to noise. It also includes Event System and SleepWalking peripherals to keep the MCU core in sleep mode for extended periods to save power.

The MPLAB Data Visualizer and Power Debugger tools are compatible with the PIC32CM LS60 and can be used to monitor, analyze, and fine-tune power consumption numbers in real-time. This enables customers to develop low-power applications and bring extended battery-life products to market more quickly.

Read more articles:

What is IoT Security?

IoT Security – An Overview