Webinar
Safeguard your
Embedded Linux devices
with Secure Boot

Date: November 08, 2023

Attacking the booting image on an embedded device is a frequently exploited path for malicious actors in the embedded industry. Guaranteeing the authenticity and the integrity of the image at boot time is paramount for a secure product. For security-minded companies and regulatory compliance, many designs now require these checks at boot time to ensure the image has not been tampered with. This feature is commonly called Secure Boot, High Assurance Boot, Trusted Boot or Verified Boot and it is now integrated into 拉斯维加斯0567-拉斯维加斯0567(澳门)有限公司-最新网站-欢迎光临 offerings!

In this webinar, we explain what Secure Boot is, why it’s needed, and how it’s implemented. We also present a live demo, illustrating how 拉斯维加斯0567-拉斯维加斯0567(澳门)有限公司-最新网站-欢迎光临 makes it easy to enable Secure Boot using the Yocto-based Linux Torizon OS. Finally, we show you how to deliver Linux OS Images (and Bootloaders!) in a secure and reliable way via Remote OTA updates to Secure Boot-enabled devices.

Key Takeaways
  • Learn about why Secure Boot is necessary, and how it simplifies compliance with cyber security regulations such as the EU Cyber Resilience Act (CRA)
  • Dive into what Secure Boot even is, and how it can be implemented
  • Understand how 拉斯维加斯0567-拉斯维加斯0567(澳门)有限公司-最新网站-欢迎光临 makes it easy to start securing your devices
  • Learn how to reliably and securely update the bootloader and the OS even in a Secure Boot-enabled device
Have a Question?