Filter results by
By ARTIK Team April 9, 2018
Device protection and trusted code execution must be at the heart of a truly secure IoT solution. The Samsung ARTIK™ IoT platform’s key management system, code signing features, and hardware secure boot features defend connected devices by verifying software before installing and running it.
By ARTIK Team March 26, 2018
Rolling your own IoT security is asking for a big headache - time added to your project, resources reallocated, plus the risk you'll miss something important.
By ARTIK Team February 22, 2018
We discuss ten ways in which the Samsung ARTIK IoT platform is ideally suited to help you build a secure IoT product.
By ARTIK Team February 9, 2018
While Samsung ARTIK modules include ARM processors, only the ARTIK 530, includes a potentially vulnerable processor. An updated version of Ubuntu will be made available before Feb 28.
By ARTIK Team February 8, 2018
Whether you leverage the Internet of Things (IoT) to improve your business processes or your business is creating IoT solutions, you need to be aware of security risks you’ll face in 2018.
By ARTIK Team January 17, 2018
Here is our take on some of the major IoT security trends to follow in 2018, including digital identity and regulatory challenges.
By Wei Xiao November 23, 2016
In this tutorial, we start to look at the practicalities of using the Trustonic Trusted Execution Environment with Samsung ARTIK. ARM® TrustZone® ARM TrustZone technology is a System on Chip (SoC) and CPU, system-wide approach to security. TrustZone is hardware-based security built into the SoCs. The family of TrustZone technologies can be integrated into any ARM Cortex-A and the latest Cortex-M23 and Cortex-M33 based systems. ...
By Mark Wright October 27, 2016
Mark Wright explains how using an IoT platform with end-to-end security can help manufacturers prevent their connected devices from being hacked in cyberattacks.
By Vikram Ramesh, Thales e-Security August 8, 2016
In this guest blog post, one of our security partners, Thales, explains how their systems are used to establish the "root of trust" with ARTIK modules.
By Trustonic Team May 26, 2016
Editor’s note: In this guest blog about IoT security, our partner Trustonic delves into specific use cases for its Trusted Execution Environment, which comes bundled with ARTIK.