BG Networks

Articles related to BG Networks
IoT

Cybersecurity Labeling for Consumer IoT Devices In the U.S.: The Who, What, When, Why, and How - Blog

October 27, 2022

Earlier this month, the White House brought together federal agencies and number of consumer companies, including Amazon, Google, and Intel, to discuss a cybersecurity labeling program for IoT consumer devices. The program calls for EnergyStar like labeling to educate consumers and give them piece of mind that the IoT devices they purchase have a “baseline” of security.

Security

Embedded Executive: Roman Lysecky, CTO, BG Networks - Podcast

October 05, 2022

The topic on Embedded Executives eventually gets around to security, the specialty of BG Networks, but we had an interesting discussion about what’s happening in today’s universities.

Security

Embedded World 2022 Best in Show Winners: Security - Story

June 17, 2022

Winners have been chosen based on a 15-point rubric that considers solutions’ Design Excellence (5 points), Relative Performance (5 points), and Market Impact/Disruption (5 points).

Security

BG Networks BGN-SAT Security Automation Tool - Product

June 16, 2022

BGN-SAT Security Automation Tool helps engineers quickly improve security, reduce development time, and take advantage of in-silicon security features in their embedded designs.

Security

Product of the Week: BG Networks' Security Automation Tool - Story

May 10, 2022

The importance of security in embedded designs can never be stressed enough. With the expanding cybersecurity threat landscape and lack of security professionals in the workforce, everyday engineers need to be able to implement hardware root-of-trust-grade security in a robust but simplified manner.

Automotive

Automotive Cybersecurity: Progress, But Still Room for Improvement - Blog

June 14, 2021

This blog is the second of three that will review cyberattacks that exposed severe vulnerabilities. My goal is to help you improve the cybersecurity of your IoT devices by presenting security features that would have mitigated each of the attack vectors used. I’ll also partake in a webinar where we’ll dive into these security features using BG Networks security automation tools, open-source software, and WINSYSTEMS off-the-self hardware.