Red Curry of Tautuk, interviews Larry O’Connell in our first Fast Chat. They talk about the Zero Trust concept, what it truly entails, and how you can implement it efficiently
Newsletter: Visit Sequitur Labs at Embedded Vision Summit 2022
Visit Sequitur Labs in Booth 523 as we showcase complete chip-to-cloud software and SaaS solutions at the Embedded Vision Summit 5/17 – 5/18.
Newsletter: Sequitur Labs Collaborates with Lenovo to Protect AI Models AT THE EDGE
The EmSPARK™ Security Suite will be utilized as part of the Lenovo ThinkEdge™ SE70 platform, powered by NVIDIA Jetson.
Sequitur Labs Releases Turnkey Solution to Simplify Protection of Edge AI Models Powered by the NVIDIA Jetson Platform
Sequitur Labs now offers AI model protection with NVIDIA Jetson.
PSA Certified 2022 Security Report Release
The PSA Certified 2022 Security Report uncovered unique insights into the state of IoT security, the trends, the impact of the pandemic and the barriers to adoption. Access the full report.
Connected Device Security Gets Wider Attention
In the past, it was often the case that what was discussed in the embedded systems and semiconductor industry stayed in the industry. Nobody outside of it was really interested in what happens within it, as it didn’t apparently affect them. That’s not the case any more as chips have become mainstream—everyone talks about our dependency on them, and everyone now takes notice of any pinch points and challenges, and we’ve also seen a rush by several nations to push for semiconductor investment programs.
Newsletter: Secure Over-the-Air and Local Updates with Sequitur Labs Security Platform
Firmware updates are critical security events for any IoT solution. Recent high-profile attacks have occurred during the update process.
Newsletter: Understanding Secure Boot
A robust secure boot process is also a core function of secure firmware updates, device failure recovery, and software provisioning.
Newsletter: WHITEPAPER – Securing Smart Devices
The primary object of attention and protection is the intellectual property in the form of rich applications that include artificial intelligence (AI) and machine learning (ML) algorithms at the edge.
Deployment of Secure Networks Connect Control Engineering Solutions
As industrial control systems (ICSs) become integrated with the internet, robust security is critical on every level.