Crypto Quantique demonstrated the QuarkLink Hybrid PQC security platform at Embedded World 2025. The company also showcased its latest analog and digital silicon IP offerings for device security. QuarkLink is an integrated, scalable, cloud-based software platform that reduces the time and expense of implementing all necessary security functions in embedded device IoT networks and industrial […]
Security
Multi-core MCUs feature AES-256 and RSA-4096 security
Synaptics Incorporated has expanded its AI-Native platform with a new series of microcontroller units designed for edge computing applications. The SR-Series MCUs implement three operational tiers: a 100 GOPS performance tier, an efficiency tier, and an ultra-low-power always-on tier. The hardware architecture is based on an Arm Cortex-M55 core operating at speeds up to 400 […]
Factory-keyed MCUs support security compliance
STMicroelectronics has introduced new STM32U3 microcontrollers designed with power-saving innovations for smart connected technology deployment in remote locations. These MCUs are developed for IoT devices that must operate for extended periods without maintenance while using limited energy from sources such as coin cells or ambient solar or thermoelectric power. The STM32U3 series incorporates near-threshold chip […]
MPUs add graphics, audio, GbE, and time-sensitive networking
Microchip Technology announces its portfolio of SAMA7D65 MPUs based on the Arm Cortex-A7 core running up to 1 GHz and offered in a System-in-Package (SiP) with a 2 Gb DDR3L and System-on-Chip (SoC). The SAMA7D65 MPU series is designed to target Human-Machine Interface (HMI) and connectivity applications with its advanced graphic features. The graphic features of the SAMA7D65 […]
Microcontroller achieves 168 µa/MHz power consumption
Renesas Electronics Corporation introduced the RA4L1 microcontroller (MCU) group, including 14 new devices with ultra-low power consumption, advanced security features, and segment LCD support. Based on an 80-MHz Arm Cortex M33 processor with TrustZone support, the new MCUs deliver an unmatched combination of performance, features, and power savings that enable designers to address a myriad […]
Bluetooth module increases processing while reducing power
u-blox has expanded its portfolio by introducing six new variants of the NORA-B2 Bluetooth Low Energy modules. Now integrating the entire range of Nordic Semiconductor’s next-level nRF54L Series of ultra-low power wireless Systems-on-Chip (SoCs), NORA-B2 offers a versatile solution for mass market segments thanks to its choices of antennas, architectures, and chipsets. The new additions […]
Runtime monitoring tool captures core dumps in embedded systems
Percepio introduces Detect software for embedded systems and edge device testing, bringing continuous observability to development workflows. The tool extends existing Continuous Integration and Continuous Testing processes by implementing runtime monitoring and diagnostic capture capabilities for embedded software development teams. The system monitors performance parameters during testing phases, identifying timing violations and watchdog timer margin […]
C3 MCUs integrate crypto accelerator and PSA Level 2 security features
Infineon Technologies AG has launched PSOC Control, the newest family of high-performance Arm Cortex-M33-based microcontrollers (MCUs). With the support of system design tools and software in ModusToolbox, this comprehensive solution allows developers to create high-performance, highly efficient, and secured motor control and power conversion systems with ease. PSOC Control C3 features Entry and Main Line […]
How does a zero trust security architecture work?
Zero trust architectures (ZTAs) are a reaction to the emergence of cloud computing, remote work, and bringing your own device (BYOD) into enterprise networks. Those trends result in networks not completely contained within an enterprise-owned boundary, significantly complicating network security needs. This article briefly reviews the purpose and structure of ZTAs, looks at some relevant […]
What can be done to prepare for post quantum cryptography?
Post-quantum cryptography (PQC), also called quantum-safe cryptography, uses mathematical algorithms to create security environments resistant to quantum computer attacks. PQC is a rapidly evolving technology, and preparing for its adoption requires keeping up with developments in several areas. As part of the formalization of PQC algorithms, NIST has finalized the algorithms and changed their names […]









