MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: Building Cyber-resilient Embedded Systems: Insights From Industry Leaders – Manufacturing AUTOMATION
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$77,768.00-0.36%
  • ethereumEthereum(ETH)$2,318.29-0.66%
  • tetherTether(USDT)$1.00-0.01%
  • rippleXRP(XRP)$1.41-1.06%
  • binancecoinBNB(BNB)$626.73-0.81%
  • usd-coinUSDC(USDC)$1.000.01%
  • solanaSolana(SOL)$85.12-1.64%
  • tronTRON(TRX)$0.3251090.40%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.020.00%
  • dogecoinDogecoin(DOGE)$0.097946-0.84%
Global Regulations

Building Cyber-resilient Embedded Systems: Insights From Industry Leaders – Manufacturing AUTOMATION

Last updated: January 28, 2026 2:00 am
Published: 3 months ago
Share

As connected devices have become ever-present in our lives, the need for robust embedded security has never been greater. In a recent Let’s Talk Technical roundtable with top embedded and micro suppliers, I spoke with experts from Analog Devices, STMicroelectronics, NXP and Microchip Technology to hear their perspectives on the evolving landscape of embedded security and its critical role in today’s connected world.

While data centres operate in controlled environments with physical safeguards, embedded devices operate in vehicles, home appliances and medical devices “in the wild.” They require robust, decentralized protection strategies, unlike centralized data centres, which can be vulnerable to physical tampering like side channel attacks. The decentralized nature of embedded devices demands security that is built in from the start, not bolted on later.

Let’s dive into some insights on securing embedded systems, navigating new global regulations, advanced concepts and more.

The Cyber Resilience Act: Raising the bar

Carlos Serratos from NXP explained how the Cyber Resilience Act (CRA) shifts accountability to manufacturers. Adhering to the CRA impacts manufacturers across the globe, not just in Europe. It requires risk assessments for hardware and software, countermeasures against identified threats and vulnerability reporting throughout the product lifecycle. This ensures every layer of the value chain, from microcontrollers to finished goods, meets new security expectations. Failure to comply can lead to penalties and reputational damage, making security a legal obligation rather than just a best practice.

Doug Gardner from Analog Devices added that regulations such as NIST, PSA, IEC 62443 and ISO 21434 are shaping development workflows across industries. Companies must integrate cryptographic primitives, isolation mechanisms and secure identity management into their engineering processes. To help developers manage these growing requirements, chipmakers are providing tools, SDKs and lifecycle monitoring solutions that simplify compliance and reduce the risk of implementation errors. This support helps developers integrate security without overwhelming complexity.

Xavier Bignalet from Microchip provided an overview of threat modelling, which defines the risk landscape for each device and application. He explained that modern development must include post-production lifecycle management, ensuring that devices remain secure even after deployment through regular updates, monitoring and incident response. He stressed that security doesn’t end at deployment. Continuous monitoring, firmware updates and incident response are essential to maintain resilience against evolving threats.

Secure design principles

Mena Roumbakis from STMicroelectronics underscored that strong security starts early. From the first design phase, developers must conduct risk assessments, follow secure coding practices, implement secure boot and zero-trust systems, confirm supply chain integrity, and maintain documentation to support regulatory compliance. These principles ensure trust from silicon to cloud.

The panel also agreed on the importance of a secure supply chain and the use of zero-trust programming to protect private keys, IP and firmware from tampering during manufacturing. Gardner also highlighted zero-trust systems and explained how hyperconnected devices must continuously verify trust before exchanging data. As AI and machine learning move to the edge, ensuring that data remains authentic and reliable becomes even more vital.

Advanced security concepts

The experts also explored Secure Enclave technologies, isolated hardware environments designed to safeguard critical keys and processes. NXP, Microchip, Analog Devices and STMicroelectronics each implement this concept differently through terms like Crypto Authentication, Trusted Execution Environments (TEE) and TrustZone. Despite different branding, the core principles are similar: protect credentials, enforce trusted execution and comply with evolving regulations.

The concept of a Secure Enclave is central to modern embedded security. It acts as an isolated environment within a processor, similar to a hotel safe, designed to protect sensitive data and execute critical security functions. It combines hardware and software mechanisms, including hardware isolation, secure execution environment, secure boot and authentication, cryptographic processing and run-time integrity monitoring.

These solutions physically and logically isolate sensitive operations from general processing, reducing the attack surface and ensuring a hardware-based root of trust. As AI and machine learning move to the edge, ensuring data authenticity and integrity becomes even more critical.

Panel members emphasized that complexity is the enemy of security, underscoring the importance of isolation and layered defenses. Large systems, such as operating systems, inevitably contain flaws, so critical assets like encryption keys must be stored in highly secure environments to prevent catastrophic “break one, break all” attacks. Real-world examples, such as vehicles being hacked remotely through entertainment systems, highlight the importance of these measures.

While the concept of isolation is not new — credit card chips, SIM cards and TPMs have used it for decades — it is now being extended across industries. Technologies like ARM TrustZone add another layer by creating hardware-enforced secure states for running critical code, complementing dedicated secure elements for maximum protection.

The bottom line

Wrapping up, Bignalet emphasized the legal and operational consequences of noncompliance. Organizations that fail to design security into their products risk not only breaches but also potential litigation under new global standards. Security is no longer optional — it’s a legal, operational and ethical necessity. The industry is aligning to build trust at every layer of connectivity, ensuring resilience in an increasingly connected world.

For more information and to view the entire Let’s Talk Technical discussion, visit DigiKey.com.

Shawn Luke is a technical marketing engineer at DigiKey. DigiKey is recognized as a global leader and continuous innovator in the cutting-edge commerce distribution of electronic components and automation products worldwide, providing more than 17 million components from over 3,000 quality name-brand manufacturers.

Read more on Manufacturing AUTOMATION

This news is powered by Manufacturing AUTOMATION Manufacturing AUTOMATION

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Jerome Glenn Publishes New Article on AGI Governance in The Club of Rome – The Millennium Project
IMO Opens New Pacific Office to Boost Maritime Ties
UN warns Colombia over mercury contamination in Atrato River, calls crisis a human rights emergency
LG Display wins two CES 2026 Innovation Awards for world-first automotive displays
Latest Research on Frequency in the Small Satellite Market by MarketsandMarkets™

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article Ethereum Price Holds Steady With $4,000 in February View
Next Article Aaron Brown: As freedom is tested in Minnesota, the world watches
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d