Trusted Objects’ TO-protect integration with Device Authority’s KeyScaler IoT IAM Platform.
“Trusted Objects and Device Authority session at the IoT Security Summit hosted by Device Authority
Oct 13, 2021: 3:00 pm UK / 4:00 pm CET 2021
How to ensure Trust & Security for MCUs without TF-M, TPM or Secure Element chip ?
In this session Trusted Objects and Device Authority will discuss the alternatives for providing Root of Trust (RoT) on devices which don’t have MCUs with TF-M (TrustZone) nor a TPM or Secure Element chip. Alongside this the speakers will be discussing how coupling a software RoT with security automation makes Edge to Cloud possible for large scale IoT, including legacy IoT devices.”
"tops plug&go, which is part of Trusted Objects to-security offer, is a new set of services that brings security and efficiency at all stages of electronic devices manufacturing process."
“to-protect an innovative secure software library to protect IP in embedded software and to enhance security in IoT applications. A cryptography and security expert shares his views on a LoRaWAN use case”
According to IC Insights, 18 semiconductor wafer fabs were shut down in Europe between 2009 and 2018. Since 2020, Europe is facing a severe semiconductor shortage which is impacting our industries, specifically the automotive sector. We are now realizing that Europe is dependent from Asia and USA for semiconductor supply.
The "security by design" approach is gaining momentum. Despite this positive trend, we observe that the choice of a comprehensive security solution covering IoT device full life cycle is not enough taken into account.
Embedded systems and IoT systems are increasingly exposed to a wider range of new security threats, and this trend will accelerate. Unfortunately, in ecosystems where the supply chain is complex, selecting and implementing the right security could be challenging. Furthermore, it is frequent that managers making decisions on security levels are not the ones who will be held accountable for their choices.