Mender blog
How to comply with ISO/SAE 21434 & UNECE R155/R156 for robust automotive cybersecurity
Software is eating the car. A modern electric vehicle (EV) runs more than 100 million lines of codes, hundreds of electronic control units (ECUs), and includes an average of 1500 semiconductor chips. Software controls everything from the infotainment system and driver assist features to engine, power, and critical safety functions.
With an expected life of over 20 years, vehicle cybersecurity...
Read the articleEmbedded World 2023: OTA Updates Propelling Innovation Forward
The Embedded World Exhibition & Conference is one of the world's most renowned events in embedded system technologies, distributed intelligence, and the Internet of Things (IoT). The three-day event, held from the 14th to the 16th of March in Nuremberg, Germany, saw over 30,000 visitors and 900 exhibitors from around the world. The event showcased the latest innovations and technologies in the...
Read the articleMender OTA on the ESP32, Part 1
The “DNA” of Mender has two core ingredients: first, care about connected device security and second, care for the users responsible for device management. Security and people go in tandem: The right people should have the ability and knowledge to provide secure devices. The accessibility of the Mender API documentation and the open source-based device client enables this.
One of the most pro...
Read the articleTop Trend #5: Support, Training & Superior Customer Experience are essential elements in a best of breed OTA updates solution
It’s common practice now for IoT product managers and digital leaders to buy in technology and not use their precious developers to build low level infrastructure such as an OTA updates solution in-house. The benefit of partnering is to free up more time and resources to focus on core product development to gain competitive advantage in the market. It's a smart decision based on an assessmen...
Read the articleTop Trend #4: Ensuring security by design across device bootstrapping, encryption, and compliance
The secure management of connected digital products and software is a critical concern for the enterprise. In recent years, a massive increase in cyberattacks on operational technology (OT) exemplifies the safety implications of poorly protected devices. The SolarWinds attack started the compliance and regulatory snowball for software supply chain security. The LOG4j vulnerability followed s...
Read the article