Microchip’s Security Solution for IoT Devices
IoT security IoT security challenges Securing constrained devices Authorizes and authenticates devices Managing device updates Securing communication Ensuring data privacy Ensuring data integrity Securing web, mobile and cloud applications Ensuring high availability Managing vulnerabilities Detecting vulnerabilities and incidents Predicting and preempting security issues Microchip and AWS collaboration The PIC32MZEF series The SAMA5D2 The ATECC608A Summary There is no way a thermostat can enable hackers to gain access to the network and steal data you’re your right? Wrong! In April this year, hackers used a connected thermostat to get a foothold of a casino’s network. They then accessed the database and pulled back data across the network up to the cloud. This is just one in many incidences of IoT security breaches that have topped headlines this year. All these breaches highlight the security challenges associated with IoT netwo...