Select recordings from the playlist below to listen to any webinars in this series that you may have missed and to learn about helpful security tips, information and tools for your next project.
Join Cesare Garlati, a long-time supporter of the RISC-V Foundation and active member of the RISC-V Security Group, as he shares the latest on RISC-V security and offers advice for developing secure applications, especially in Internet of Things (IoT)
devices that lack a Memory Management Unit (MMU).
Learn about our Trust Platform, a three-tier provisioning service for our secure elements that also includes anew suite of tools, pre-packaged code examples and a simple supply chain process to protect keys.
The rapid explosion of cloud-enabled applications and businesses is generating a larger connectivity footprint. This means your IP is now facing a bigger and more global threat from hackers, counterfeiters and competitors. We will discuss threats and
how to counter them using a hybrid solution comprised of both hardware and software.
Secure boot protects against rootkit and bootkit attacks to the pre-boot firmware environment. This webinar discusses how to protect a system that boots from an external SPI Flash to extend a Root of Trust.
MultiZone™ Security is the first Linux® enclave for RISC-V. Our MultiZone demo will demonstrate how to secure the deterministic behavior of mixed-criticality systems where Linux and real-time come together in a single PolarFire® device.
In the world of quantum computers, signature verification methods must be resistant to quantum computer attacks. Veridify’s security methods can be implemented solely in software, allowing developers to easily implement critical security functions
such as secure boot and secure firmware updates on platforms such as the PolarFire SoC FPGA. This webinar will also describe the power and scalability of DOME, a device on-boarding, management and enrollment platform for securing a PolarFire SoC FPGA
throughout its life cycle.
Quickly and easily implement secure authentication for your Internet of Things design using our Trust&GO platform. We’ll show you how to streamline the process of enabling network authentication using our ATECC608A secure elements.
The importance of protecting your valuable intellectual property cannot be overstated. Join us for a live webinar where we'll discuss how to implement efficient IP protection using state-of-the-art cryptography techniques. We will also cover the latest
legislation with regards to the IoT, recommended design guidelines for connected devices and how microcontroller (MCU) hardware is used to implement a root of trust. We will close with a walkthrough of the C-Trust tool, highlighting the simplicity
of adding IP protection to your connected application.
From production to deployment to field updates, secure boot protects your microprocessor (MPU) solution from the very start. A secure boot is at the heart of a sustained hardware root of trust, ensuring the integrity of your device through its entire
lifecycle. Join us for this webinar to learn how easy it can be to enable secure boot on your Microchip MPU.
As in-vehicle networks continue to evolve in scale and complexity, more nodes are connected to the Controller Area Network Flexible Data-Rate (CAN FD) network, expanding the potential attack surface for hackers. In our live webinar, we’ll share
tips and techniques for improving security fundamentals in the cars of tomorrow.
Does your system boot from an SPI Flash? How do you protect your system from risk during the boot process and during firmware updates? How does your system detect and recover from corrupted Flash files? Join Microchip as we discuss the NIST 800-193 guidelines
for Platform Firmware Resiliency.
PolarFire SoC FPGAs provide secure boot out of the box. Join us live to learn how you can roll out your own secure boot methodology using these devices’ secure, nonvolatile memory that is protected with physically unclonable function technology
The TrustFLEX secure element is a pre-configured device that can leverage Microchip’s secure provisioning service. It reduces cost and risk, preventing the exposure of your secret keys to software or third parties. During this session, we will review
the various authentication use cases TrustFLEX offers by default and explain how you can implement device-to-cloud secure authentication using Microsoft Azure IoT Hub.
Many of us are familiar with logging into home Wi-Fi networks using WPA2. Larger organizations, however, such as campuses and corporations, require more advanced security protocols. This webinar will highlight the different requirements for operating
in strict security environments.
Quantum computing can pose a threat to today’s Public Key Infrastructure (PKI). What’s the solution? Why, quantum-resistant cryptography, of course. Join us with our guest, Reza Azarderakhsh, CEO of PQSecure Technology, to discuss his company’s
National Standards and Technology candidate for quantum PKI. Reza will additionally outline PQSecure’s quantum-resistant PKI solution running on Microchip PolarFire® FPGAs.