China – 中国 Japan – 日本 Korea – 한국 South Asia Taiwan
Are you concerned about security? Learn about the latest trends and new developments for safeguarding your designs. With decades of providing security product solutions used in diverse applications including healthcare, cloud connectivity, payment systems and missile systems, we can help guide you through the maze of challenges and options.
Join our security experts and partners as we provide a series of security-themed webinars designed to raise your awareness of security vulnerabilities and discuss leading-edge solutions to shield your applications from potential risks.
This class covers code attestation, runtime attestation and an overview of OEM best practices. We will show you how to securely develop and sign an image and then receive and authenticate the image on the client side.
Hacking is becoming more sophisticated, making it difficult to determine which threats you need to protect yourself from. To combat this dilemma, we offer a broad portfolio of root of trust controllers that will help you shield any platform from remote hacks, in-person attacks and even exploitation of supply chain vulnerabilities. This presentation will cover our device’s robust and customizable feature set of security and trust layers for your systems.
In this session, our expert will discuss how you can add security to your time- and safety-critical motor control, digital power, advanced sensing and robust touch applications. The dsPIC33C MPT family of secure Digital Signal Controllers (DSCs) features an integrated Hardware Security Module (HSM) that addresses security use cases such as secure boot, secure firmware upgrade and secure on-board communication. Our expert will also discuss node authentication in automotive, industrial, medical and IoT applications.
Authentication is an integral part of the Matter open standard for IoT devices. Purchasing a root certificate authority, otherwise called Product Attestation Authority, by the standard is mandatory. So why protect the private keys of your certificate chain in Hardware Security Module (HSM), but ignore the private key(s) in the actual embedded system? And what are the logistics challenges of providing the Matter certificates in the system? That’s where our experts will show you how both embedded security and logistic challenges can be addressed by our CryptoAuthentication™ ICs such as the ATECC608 and TA101 as well as our secure provisioning service and our partner, Kudeslki IoT. Join our SHIELDS UP webinar to be walked through the onboarding process of implementing secure authentication with Matter.
The WPC is now mandating new secure authentication requirements per the WPC 1.3 specification. During this session, our expert will explain what the specification requires in terms of security and will navigate you through the WPC authentication process. He will also discuss what is required from your secure element vendor to successfully pass your WPC certification when implementing secure authentication.
Our guest security expert for this webinar is Josh Datko, CEO of Cryptotronix. Josh will discuss how his design consulting firm leverages the features and functions of secure elements. He will carry out a whiteboard exercise to demystify the common but complex authentication use cases he encounters with his customers.
Security expert Thibault Richard, from EBV Elektronik, will present on the Avnet cloud IoT platform. EBV Elektronik, one of our distributor partners, created a development kit based on our Trust Platform that supports the Trust&GO, TrustFLEX and TrustCUSTOM secure elements. He will explain how you can get started with the Avnet IoTConnect cloud platform by leveraging our SAME54 32-bit microcontroller (MCU) with Mbed TLS and our secure element combined with the EBVchips Heracles 324G LTE-M/NB-IoT modem.
Our automotive security expert will dive into the needs and requirements of secure boot and message authentication functions for CAN FD buses in Advanced Driver-Assistance Systems (ADAS) and In-Vehicle Infotainment (IVI). He will also explain how the Trust Anchor TA100-VAO brings scale and security into your secure boot and message authentication for vehicle Engine Control Units (ECUs).
In this webinar, you will learn how you can complement strong device-side security provided by our secure elements with ongoing security monitoring and enforcement with AWS IoT Device Defender. Whether you prefer a low-touch, cloud-only view of device behavior or want detailed on-device metrics, you will learn how to improve the security baseline of your IoT device fleets in an automated fashion. We will run through several scenarios that will show how you can use ML- or rules-based detection to alert and mitigate device threats.
PUFs are security elements that provide unique benefits when building secure systems. During this SHIELDS UP! session, we will describe what a PUF is, what makes it an excellent choice for your design, what you can do with PUFs, the different types of PUFs that exist and why you need more than one.
Computers and other firmware-driven products have become integrated with nearly every aspect of modern life. Even the cars we drive have turned into data centers on wheels. Autonomous driving is an exciting technology that is quickly spreading across the automotive market. Naturally, you may wonder how data security and physical safety are ensured against external threats to these applications. In this webinar, our expert will discuss how we provide protection for ADAS systems and secure the code against remote attacks.
Join Cesare Garlati, a long-time supporter of the RISC-V Foundation and active member of the RISC-V Security Group, as he shares the latest on RISC-V security and offers advice for developing secure applications, especially in Internet of Things (IoT) devices that lack a Memory Management Unit (MMU).
Learn about our Trust Platform, a three-tier provisioning service for our secure elements that also includes anew suite of tools, pre-packaged code examples and a simple supply chain process to protect keys.
The rapid explosion of cloud-enabled applications and businesses is generating a larger connectivity footprint. This means your IP is now facing a bigger and more global threat from hackers, counterfeiters and competitors. We will discuss threats and how to counter them using a hybrid solution comprised of both hardware and software.
Secure boot protects against rootkit and bootkit attacks to the pre-boot firmware environment. This webinar discusses how to protect a system that boots from an external SPI Flash to extend a Root of Trust.
MultiZone™ Security is the first Linux® enclave for RISC-V. Our MultiZone demo will demonstrate how to secure the deterministic behavior of mixed-criticality systems where Linux and real-time come together in a single PolarFire® device.
In the world of quantum computers, signature verification methods must be resistant to quantum computer attacks. Veridify’s security methods can be implemented solely in software, allowing developers to easily implement critical security functions such as secure boot and secure firmware updates on platforms such as the PolarFire SoC FPGA. This webinar will also describe the power and scalability of DOME, a device on-boarding, management and enrollment platform for securing a PolarFire SoC FPGA throughout its life cycle.
Quickly and easily implement secure authentication for your Internet of Things design using our Trust&GO platform. We’ll show you how to streamline the process of enabling network authentication using our ATECC608A secure elements.
The importance of protecting your valuable intellectual property cannot be overstated. Join us for a live webinar where we'll discuss how to implement efficient IP protection using state-of-the-art cryptography techniques. We will also cover the latest legislation with regards to the IoT, recommended design guidelines for connected devices and how microcontroller (MCU) hardware is used to implement a root of trust. We will close with a walkthrough of the C-Trust tool, highlighting the simplicity of adding IP protection to your connected application.
From production to deployment to field updates, secure boot protects your microprocessor (MPU) solution from the very start. A secure boot is at the heart of a sustained hardware root of trust, ensuring the integrity of your device through its entire lifecycle. Join us for this webinar to learn how easy it can be to enable secure boot on your Microchip MPU.
As in-vehicle networks continue to evolve in scale and complexity, more nodes are connected to the Controller Area Network Flexible Data-Rate (CAN FD) network, expanding the potential attack surface for hackers. In our live webinar, we’ll share tips and techniques for improving security fundamentals in the cars of tomorrow.
Does your system boot from an SPI Flash? How do you protect your system from risk during the boot process and during firmware updates? How does your system detect and recover from corrupted Flash files? Join Microchip as we discuss the NIST 800-193 guidelines for Platform Firmware Resiliency.
PolarFire SoC FPGAs provide secure boot out of the box. Join us live to learn how you can roll out your own secure boot methodology using these devices’ secure, nonvolatile memory that is protected with physically unclonable function technology
The TrustFLEX secure element is a pre-configured device that can leverage Microchip’s secure provisioning service. It reduces cost and risk, preventing the exposure of your secret keys to software or third parties. During this session, we will review the various authentication use cases TrustFLEX offers by default and explain how you can implement device-to-cloud secure authentication using Microsoft Azure IoT Hub.
Many of us are familiar with logging into home Wi-Fi networks using WPA2. Larger organizations, however, such as campuses and corporations, require more advanced security protocols. This webinar will highlight the different requirements for operating in strict security environments.
Quantum computing can pose a threat to today’s Public Key Infrastructure (PKI). What’s the solution? Why, quantum-resistant cryptography, of course. Join us with our guest, Reza Azarderakhsh, CEO of PQSecure Technology, to discuss his company’s National Standards and Technology candidate for quantum PKI. Reza will additionally outline PQSecure’s quantum-resistant PKI solution running on Microchip PolarFire® FPGAs.
Discover the advantages of using the pre-configured ATECC608A TrustFLEX secure element along with the AWS IoT Core to implement secure authentication. We will discuss mutual authentication, OTA verification, secure boot assistance, key rotation, firmware IP protection and more. See how easy it is to go from prototype to provisioning to production with this security solution.
Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of symmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality. We will also provide real-world application examples to help you get started with using cryptography in your connected design.
Join us as Future Electronics introduces the GoodLock, a unique and trusted board that can help any designer develop and test hardware security solutions for their embedded designs. This robust and cost-effective device’s advanced features include an on-board debugger/programmer, making it the perfect platform to add trust to your product.
Learn how the pre-configured ATECC608A TrustFLEX secure element can assist with secure boot for small microcontrollers, protect a public key during an Over the Air (OTA) update and help improve firmware intellectual property protection. This webinar will include transaction diagrams and a brief tutorial on how you can use the Trust Platform Design Suite software tool to implement your application.
If you need to protect your revenue, brand or intellectual property, join us to learn how our Trust Platform for CryptoAuthentication™ Family of secure elements can help with the authentication of accessories and peripherals. We will be using a pre-configured ATECC608A TrustFLEX secure element to walk you through a short tutorial on how use the Trust Platform Design Suite software tool to easily implement secure authentication.
Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of asymmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality. We will also provide real-world application examples to help you get started with using asymmetric cryptography in your connected design.
Verifying that a system is secure can be a difficult proposition. It requires performing numerous tests that provide increased confidence in, but never quite prove, the security of an application. Formal verification is an effective alternative to testing, since it can be used to definitively prove the security properties of individual software applications. Join speakers from DornerWorks and Microchip as they discuss how formal verification can make your products more secure. They will demonstrate how the seL4 microkernel running on a PolarFire® SoC FPGA provides an excellent starting point for your next security-focused product.
Learn how our secure elements and symmetric authentication can be used to help reduce the counterfeiting of disposable cartridges and consumable goods. We will introduce you to the ATSHA206A secure element’s architecture and features and discuss how this solution can be used to enable secure authentication between a host and a disposable cartridge.
Learn how to implement mutual authentication using X509 certificates with the WolfSSL TLS stack and the TrustFLEX ATECC608 secure element from Microchip’s Trust Platform. We will discuss TLS concepts in the first half of the webinar, and then an expert from WolfSSL will give a hands-on demonstration featuring a SAM D21 Arm® Cortex®-M0+ based microcontroller and a WINC1500 Wi-Fi® module to show how easy it is to get started with mutual authentication.
This webinar will cover the most common security needs for certified systems. We will discuss suggested hardware, suggested cryptographic functions and attributes all connections should have. While this webinar is still considered a beginner class in cryptography, some prior knowledge of the fundamentals of cryptography is required.
Learn how dsPIC33 Digital Signal Controllers (DSCs) and PIC24 microcontrollers (MCUs) offer hardware code protection features that complement the ATECC608 secure element to implement secure boot and Over-the-Air (OTA) firmware updates in your application. We’ll also discuss how MPLAB® Code Configurator (MCC) simplifies the implementation of security for your application.
Automobiles are now referred to as data centers on wheels. Outfitted with advanced sensors and computers, fully autonomous cars are projected to produce 4,000 GB of data per day! How do you protect your vehicle from risk during the boot process and during firmware updates? Join us as we discuss platform firmware resiliency in automotive applications.
For IoT products, security is always top of mind. But for engineers, how to produce, provision and protect the secrets that enable secure IoT products is also a key concern. This webinar will introduce you to the WFI32E01PC family of Wi-Fi-enabled MCUs featuring Trust&GO platform technology. Discover how this solution provides a factory-programmed, verifiable and secure identity in one integrated module to drastically reduce the complexity and effort required to produce IoT products.
If you are developing IoT systems, this webinar will help you learn how to use TLS/MQTT to ensure secure endpoint-to-cloud communication and employ hardware roots of trust to enable strong security. We will also explain how to use wolfSSL, with its secure software suite integrated within our MPLAB® Harmony Framework, to secure endpoint communication.
Would you like to learn how choosing a secure element can reduce your project risk and save you money? Join us for this webinar to learn how provisioning cryptographic keys can significantly decrease costs and risks during your product’s development and production. We will also outline the benefits of using our secure elements, like the ATECC608, and leveraging our Trust Platform tools and in-house provisioning service as your security foundation to reduce your costs and risks.
During this webinar, you will learn how to enable code reusability, simplify integration and reduce maintenance costs for secure authentication in connected embedded Linux applications. Our security experts will discuss how our solutions support the standard PKCS #11 interface via the CryptoAuthLib library and security-hardened devices like the Trust Platform’s ATECC608 and the Trust Anchor TA100.
Secure provisioning is a process that allows you to securely instantiate a microprocessor’s (MPU’s) root of trust. In this webinar, we will explain why secure provisioning is important for an MPU-based solution and demonstrate how this process works.
With the explosion of data being created and consumed in the world today, the data center has become the target of individual, corporate, and even government-sponsored attacks to compromise, steal, and exploit personal, financial, medical and military and other data and secrets. The compromised company’s brand, revenue, IP and customers are at stake. Depending on the severity and financial impact of a security breach, the company itself may be at stake. Join us for this SHIELDS UP! webinar to learn how our security solutions can provide trusted platform support to help you mitigate and eliminate the risks associated with security vulnerabilities.
As industry 4.0 and smart factories continue to connect their assets and equipment to the cloud, attack surfaces grow exponentially. The ISA/IEC 62443 specification has been developed to help companies that provide equipment and infrastructure to the industrial segment to architect their systems with security in mind. Join us as we discuss how our ATECC608 secure element and Security Pattern can facilitate your journey to a successful IEC 62443 certification.
Are you unsure about how to efficiently upload tens of thousands of certificates in your AWS IoT environment once your product is ready for production? Then this session, presented by AWS Solution Architect, Ashok Bhaskar, is for you. You will learn how to implement a bulk upload of your pre-provisioned certificates from Microchip Trust&GO or TrustFLEX secure elements using AWS ThingPress and AWS IoT. You will also learn why this AWS cloud architecture helps you scale the production of your IoT device efficiently when it comes to certificate loading in your cloud production account. We will also discuss how to handle transfer of ownership and more.
Learn how our industry-leading Trust Platform Design Suite v2 dramatically reduces the time you'll spend provisioning and using our secure elements. You will learn how to accelerate your onboarding with the pre-defined uses cases and C code examples and how to use a secure secret exchange to begin the provisioning process.