Hey wolfSSL friends, Check out this recording by wolfSSL engineer David Garske who demonstrates multiple live demos of wolfTPM and gives real-life examples of wolfBoot at TPM.dev 2020 Mini Conference Day 1. Click on the link below to find the slides attached and the video recording! Click here: Real-life examples of wolfBoot and wolfTPM To learn […]
Read MoreMore TagCategory: Uncategorized
Check out Microchip and wolfSSL’s Partner Webinar!
Shields UP #24: Using wolfSSL and Pre configured TrustFlex ATECC608 Secure Element for TLS Networks Learn how to implement mutual authentication using X509 certificates with the WolfSSL TLS stack and the TrustFLEX ATECC608 secure element from Microchip’s Trust Platform. We will discuss TLS concepts in the first half of the webinar, and then an expert […]
Read MoreMore TagWhat is the difference between FIPS 140-2 and FIPS 140-3?
This week we are tackling the question: what is the difference between FIPS 140-2 and FIPS 140-3? wolfSSL is currently the leader in embedded FIPS certificates and we always want to keep our users up to the date on the latest standards! With various specification updates, the newest standard of FIPS 140-3 will include the […]
Read MoreMore TagUpgrading to Measured Boot using wolfBoot
At wolfSSL, we work together with our customers to enhance embedded security. This includes providing an embedded MCU TPM, MCU secure boot, and similar security options. Today, there is a de-facto standard for IoT security and that is the use of Secure Boot. However, Secure Boot provides us with only a single check over our […]
Read MoreMore TagBrief comparison of the existing TPM2.0 libraries
This is a comparison of key features in the available open-source stacks for using Trusted Platform Modules(TPM). TPMs are the most widely available TPM in modern computer systems and it is increasingly seeing adoption for IoT devices and various Embedded Systems. The communication between the TPM and the MCU happens using I2C or SPI bus. […]
Read MoreMore TagHow is wolfTPM better than the existing TPM stacks and why is it easier?
1. wolfTPM can run on resource constrained MCU, Embedded Systems and devices (IoT, Edge) 2. wolfTPM can be used in Trusted Execution Environments(TEE) and ARM TrustZone 3. wolfTPM does not have external dependencies 4. wolfTPM is the only open-source TPM2.0 stack that can be used in bare metal firmware 4.1 For industrial products using superloop […]
Read MoreMore TagwolfCrypt on CMVP Implementation Under Test List
wolfCrypt has been listed on the CMVP IUT List for FIPS 140-3! We are currently working with our testing lab to get validated as quickly as possible with the new FIPS standard from the NIST. Among the changes for FIPS 140-3 are conditional algorithm self-tests, where the algorithm self-tests are only performed if used. The […]
Read MoreMore TagAvionics Systems in Need of New Cybersecurity Testing
The U.S. Government Accountability Office (GAO) has pushed for further guidelines and regulations to ensure security in Avionics Systems. The report indicates potential cyber risks such as data spoofing, outdated systems, long update cycles, and software vulnerabilities. Researches have also highlighted the vulnerabilities to in-flight connectivity systems including the usage of cheap equipment to eavesdrop […]
Read MoreMore TagSecure wolfMQTT SN with wolfSSL DTLS
The sensor network sub-specification of MQTT does not designate a method for securing the communication between the clients and the gateway. We here at wolfSSL think that is unacceptable! Using the DTLS library of wolfSSL, we would like to protect the sensor data all the way from the client to the gateway, and then from […]
Read MoreMore TagcURL TPM/HSM Integration
Dear Internet, Would you love to have cURL integrated into your TPM/HSM for enhanced security? Tell us what makes sense! If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247. Your’s truly, wolfSSL
Read MoreMore Tag
