BROWSING: Icon Labs
Embedded security: names to know
Encryption, authentication, secure boot functionality, and tamper detection are among the best practices used to secure connected computers and servers. These same practices can be part of embedded devices, but usually they cannot be added to a device the way they are often added...