Foundational security enablers
This video quickly introduces the viewer to embedded systems security by discussing the problem and providing a framework for crafting an effective cybersecurity strategy for the embedded space that includes the many flavors of IoT and edge computing. As the involvement of these systems in our daily lives grows, so does the risks, necessitating more effective security strategies. Even nation states have recognized the potential impact and are actively crafting and adopting legislation that will highly motivate companies providing products in these spaces and others to adopt required best practices. One example of such legislation is the Cyber Resilience Act (CRA) in the European Union.
The need and demand for security is growing faster than industry expertise, which was already in high demand. Many designers are finding that they need to quickly learn how to implement these best practices and secure their products. This short overview video discusses some of the foundational security enablers such as secure boot and cryptographic accelerators that can help them start this journey. It also points to many other resources that they can use to go learn more.