Best practices: Embedded systems security

In our continued effort to share best practices around embedded systems (where digital intelligence is embedded in non-digital devices or materials), we want to point our readers to recent guidelines issued by the Trusted Computing Group (TCG). The guidelines focus on software and firmware updates for embedded systems, which have become increasingly important as the number of cyber attacks continue to rise. 

Embedded system security is important from day one of design and development, but these best practices related to software and firmware updates point to the importance of security throughout the life of the product. Attention to security doesn’t end when development is done; it never ends. Adhering to these tips and best practices can help protect your end users and your company’s reputation.