Showing all entries in ‘Blog’
Not all TEEs are equal. All the 1.7 billion+ devices with Trustonic Secured Platform have a root of trust injected in the factory, meaning that the device’s identity can be trusted.
With Kinibi-M, Trustonic is extending its security expertise to drone IoT devices
The second part of Richard Hayton's blog on IoT security.....
IoT solutions need to be secure by design..........
From IoT identity to user authority
At Trustonic, we are obviously excited by the possibilities offered by connected cars, but we also see the security issues and are keen that security is at the forefront of minds, rather than being a late afterthought.