Select recordings from the playlist below to listen to any webinars in this series that you may have missed and to learn about helpful security tips, information and tools for your next project.
Join Cesare Garlati, a long-time supporter of the RISC-V Foundation and active member of the RISC-V Security Group, as he shares the latest on RISC-V security and offers advice for developing secure applications, especially in Internet of Things (IoT)
devices that lack a Memory Management Unit (MMU).
Learn about our Trust Platform, a three-tier provisioning service for our secure elements that also includes anew suite of tools, pre-packaged code examples and a simple supply chain process to protect keys.
The rapid explosion of cloud-enabled applications and businesses is generating a larger connectivity footprint. This means your IP is now facing a bigger and more global threat from hackers, counterfeiters and competitors. We will discuss threats and
how to counter them using a hybrid solution comprised of both hardware and software.
Secure boot protects against rootkit and bootkit attacks to the pre-boot firmware environment. This webinar discusses how to protect a system that boots from an external SPI Flash to extend a Root of Trust.
MultiZone™ Security is the first Linux® enclave for RISC-V. Our MultiZone demo will demonstrate how to secure the deterministic behavior of mixed-criticality systems where Linux and real-time come together in a single PolarFire® device.
In the world of quantum computers, signature verification methods must be resistant to quantum computer attacks. Veridify’s security methods can be implemented solely in software, allowing developers to easily implement critical security functions
such as secure boot and secure firmware updates on platforms such as the PolarFire SoC FPGA. This webinar will also describe the power and scalability of DOME, a device on-boarding, management and enrollment platform for securing a PolarFire SoC FPGA
throughout its life cycle.
Quickly and easily implement secure authentication for your Internet of Things design using our Trust&GO platform. We’ll show you how to streamline the process of enabling network authentication using our ATECC608A secure elements.
The importance of protecting your valuable intellectual property cannot be overstated. Join us for a live webinar where we'll discuss how to implement efficient IP protection using state-of-the-art cryptography techniques. We will also cover the latest
legislation with regards to the IoT, recommended design guidelines for connected devices and how microcontroller (MCU) hardware is used to implement a root of trust. We will close with a walkthrough of the C-Trust tool, highlighting the simplicity
of adding IP protection to your connected application.
From production to deployment to field updates, secure boot protects your microprocessor (MPU) solution from the very start. A secure boot is at the heart of a sustained hardware root of trust, ensuring the integrity of your device through its entire
lifecycle. Join us for this webinar to learn how easy it can be to enable secure boot on your Microchip MPU.
As in-vehicle networks continue to evolve in scale and complexity, more nodes are connected to the Controller Area Network Flexible Data-Rate (CAN FD) network, expanding the potential attack surface for hackers. In our live webinar, we’ll share
tips and techniques for improving security fundamentals in the cars of tomorrow.
Does your system boot from an SPI Flash? How do you protect your system from risk during the boot process and during firmware updates? How does your system detect and recover from corrupted Flash files? Join Microchip as we discuss the NIST 800-193 guidelines
for Platform Firmware Resiliency.
PolarFire SoC FPGAs provide secure boot out of the box. Join us live to learn how you can roll out your own secure boot methodology using these devices’ secure, nonvolatile memory that is protected with physically unclonable function technology
The TrustFLEX secure element is a pre-configured device that can leverage Microchip’s secure provisioning service. It reduces cost and risk, preventing the exposure of your secret keys to software or third parties. During this session, we will review
the various authentication use cases TrustFLEX offers by default and explain how you can implement device-to-cloud secure authentication using Microsoft Azure IoT Hub.
Many of us are familiar with logging into home Wi-Fi networks using WPA2. Larger organizations, however, such as campuses and corporations, require more advanced security protocols. This webinar will highlight the different requirements for operating
in strict security environments.
Quantum computing can pose a threat to today’s Public Key Infrastructure (PKI). What’s the solution? Why, quantum-resistant cryptography, of course. Join us with our guest, Reza Azarderakhsh, CEO of PQSecure Technology, to discuss his company’s
National Standards and Technology candidate for quantum PKI. Reza will additionally outline PQSecure’s quantum-resistant PKI solution running on Microchip PolarFire® FPGAs.
Discover the advantages of using the pre-configured ATECC608A TrustFLEX secure element along with the AWS IoT Core to implement secure authentication. We will discuss mutual authentication, OTA verification, secure boot assistance, key rotation, firmware
IP protection and more. See how easy it is to go from prototype to provisioning to production with this security solution.
Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of symmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality.
We will also provide real-world application examples to help you get started with using cryptography in your connected design.
Join us as Future Electronics introduces the GoodLock, a unique and trusted board that can help any designer develop and test hardware security solutions for their embedded designs. This robust and cost-effective device’s advanced features include an on-board debugger/programmer, making it the perfect platform to add trust to your product.
Learn how the pre-configured ATECC608A TrustFLEX secure element can assist with secure boot for small microcontrollers, protect a public key during an Over the Air (OTA) update and help improve firmware intellectual property protection. This webinar will include transaction diagrams and a brief
tutorial on how you can use the Trust Platform Design Suite software tool to implement your application.
If you need to protect your revenue, brand or intellectual property, join us to learn how our Trust Platform for CryptoAuthentication™ Family of secure elements can help with the authentication of accessories and peripherals. We will be using
a pre-configured ATECC608A TrustFLEX secure element to walk you through a short tutorial on how use the Trust Platform Design Suite software tool to easily implement secure authentication.
Are you unfamiliar with cryptography or do you need a refresher in
secure communication? At this webinar, we will explore the fundamentals
of asymmetric cryptography and discuss how identity is created and used
for authentication, integrity and confidentiality.
We will also provide real-world application examples to help you
get started with using asymmetric cryptography in your connected
Verifying that a system is secure can be a difficult proposition. It requires performing numerous tests that provide increased confidence in, but never quite prove, the security of an application. Formal verification is an effective alternative to testing,
since it can be used to definitively prove the security properties of individual software applications. Join speakers from DornerWorks and Microchip as they discuss how formal verification can make your products more secure. They will demonstrate
how the seL4 microkernel running on a PolarFire® SoC FPGA provides an excellent starting point for your next security-focused product.