We are excited to announce our new partnership with Tropic Square and the integration of wolfBoot with their TROPIC01 secure element. Tropic Square has developed an open architecture hardware secure element for applications, including IoT devices, crypto wallets, or any modern application that prioritizes security. Unlike most hardware secure elements, the TROPIC01 solution is built […]
Read MoreMore TagMonth: June 2025
Live Webinar: How to get FIPS 140-3 for YOUR Linux Distro
If your product is built on Linux and targets government or regulated industries, FIPS 140-3 compliance is essential. Join us for a webinar to learn how to bring your Linux-based system into compliance using wolfCrypt, the world’s first SP800-140Br1 FIPS 140-3 validated cryptographic module. Register Now: How to get FIPS 140-3 for YOUR Linux Distro […]
Read MoreMore TagwolfSSL: Pioneering the Next Evolution of FIPS 140-3 Security! – Part 3
While having “all the algorithms, modes, and key sizes” available is nice, sometimes it is too much. wolfSSL is pleased to offer FIPS 140-3 tailoring services. We can take any of our larger FIPS 140-3 module(s), strip them down to just the bare essentials, and validate just the subset. Need only ECDSA (verify) and SHA-512 […]
Read MoreMore TagwolfSSL: Pioneering the Next Evolution of FIPS 140-3 Security! – Part 2
wolfSSL is launching new FIPS 140-3 level 2 and level 3 validation services to make achieving compliance easier than ever. Our team will test our software module on your target hardware for Level 2 and Level 3, guiding your device through the validation process with little to no burden on your team. You provide the […]
Read MoreMore TagwolfSSL: Pioneering the Next Evolution of FIPS 140-3 Security! – Part 1
Building on our legacy of FIPS 140-3 certified solutions, wolfSSL is in the planning stages of forging our
Read MoreMore TagLive Webinar: wolfSSL 2025 Roadmap
Discover What’s New in Embedded Cybersecurity in the wolfSSL 2025 Roadmap Webinar The future of embedded cybersecurity is rapidly evolving, and wolfSSL is leading the way. Join us on June 12th at 9 AM PT for an exclusive look at the wolfSSL 2025 Roadmap, presented by wolfSSL Engineering Manager, Chris Conlon. Register now: wolfSSL 2025 […]
Read MoreMore TagLive Webinar: wolfSSL solutions for the AMD/Xilinx UltraScale+ MPSoC and Versal – Tailored for the Asia-Pacific Time Zone
Learn how to secure AMD/Xilinx UltraScale+ MPSoC Versal with wolfSSL’s high-performance cryptographic solutions. As cybersecurity threats evolve, embedded systems require robust, high-performance cryptography. wolfSSL provides lightweight, high-speed, and FIPS 140-3 validated cryptography tailored for resource-constrained environments like AMD/Xilinx UltraScale+ MPSoC and Versal. With support for secure boot, firmware updates, and TLS 1.3, wolfSSL ensures end-to-end […]
Read MoreMore TagCurve25519 Blinding Support Added in wolfSSL 5.8.0
As of wolfSSL version 5.8.0, support for Curve25519 blinding has been introduced. Although originally listed as a feature addition in the changelog, it is more accurately characterized as a mitigation for a potential side-channel vulnerability affecting specific builds. This feature offers optional hardening against power or electromagnetic (EM) analysis during Curve25519 private key operations. While […]
Read MoreMore TagwolfSSL Adds Support for Open Watcom Compiler
Introduction The wolfSSL embedded SSL/TLS library has recently expanded its compatibility by adding support for the Open Watcom C/C++ compiler. This enhancement enables developers to build wolfSSL using Open Watcom across multiple platforms including Windows, Linux, and OS/2. This blog post explores the new Open Watcom support, its features, and how to leverage it in […]
Read MoreMore TagMeeting Secure Boot Compliance Requirements
In today’s regulatory environment, implementing a secure bootloader is no longer just a best practice – it’s becoming a compliance mandate. Recent cybersecurity regulations across the globe (from the EU to the US and beyond) explicitly call for measures like secure boot and firmware authenticity verification as requirements for connected devices. In this updated post […]
Read MoreMore Tag
