We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X

Live Chat

Need Help?

Privacy Policy

Development Tools Webinars

Discover how to use our ecosystem of hardware tools, software and other resources to simplify and speed up your development.

FPGA Webinars

Learn about our Field-Programmable Gate Arrays (FPGAs) and the resources that will help you get started with your development.

Security Webinar Series

Learn about the latest trends and new developments for safeguarding your designs.

Synchronization and Timing Webinar Series

Learn about the latest developments in resilient synchronization and timing systems.

Rapid Prototyping Webinar Series

In this three-part webinar series, you will learn how to start designing quickly using our award-winning Integrated Development Environments (IDEs) with production-ready code generation tools and best-in-class rapid prototyping hardware.

MakerZone Webinar Series 

This exciting new webinar series focuses on the maker community and what we are doing to continue to support this vibrant and creative community. This series will cover topics such as our new evaluation boards, Arduino® support in our MCU development ecosystems and other topics of interest to all the makers out there. Hosted by Microchip's Wizard of Make, Bob Martin, this series will bring insight into all the projects, resources and product portfolios that we offer to support the maker community. Each episode will be presented live and will be filled with cool maker content, leaving time for audience Q&A. 

Mission Assurance Webinar Series

In Aerospace and Defense (A&D), mission assurance refers to the guarantee that all the disciplines involved in bringing a product to market work together to minimize risk while meeting your end clients’ requirements. In our mission assurance webinar series, we will be bringing you resources to support your personal mission assurance.

Mi-V Ecosystem Unleashed Training Series

Mi-V Ecosystem Unleashed is a technical webinar series that showcases the various offerings for PolarFire® SoC FPGAs from Microchip and our Mi-V ecosystem partners. Each of these webinars will help to optimize your products by reducing power, enhancing security and reliability and helping you take them to market faster.

Archives


Implementing Multizone Security in RISC-V Applications

Join Cesare Garlati, a long-time supporter of the RISC-V Foundation and active member of the RISC-V Security Group, as he shares the latest on RISC-V security and offers advice for developing secure applications, especially in Internet of Things (IoT) devices that lack a Memory Management Unit (MMU).

Microchip Trust Platform for the CryptoAuthentication™ Family

Learn about our Trust Platform, a three-tier provisioning service for our secure elements that also includes a new suite of tools, pre-packaged code examples and a simple supply chain process to protect keys.

Protecting Your IP in a Cloud-Connected World

The rapid explosion of cloud-enabled applications and businesses is generating a larger connectivity footprint. This means your IP is now facing a bigger and more global threat from hackers, counterfeiters and competitors. We will discuss threats and how to counter them using a hybrid solution comprised of both hardware and software.

Trust Your Firmware: Secure Boot for Application Processors

Secure boot protects against rootkit and bootkit attacks to the pre-boot firmware environment. This webinar discusses how to protect a system that boots from an external SPI Flash to extend a Root of Trust.

RISC-V Enclaves

MultiZone™ Security is the first Linux® enclave for RISC-V. Our MultiZone demo will demonstrate how to secure the deterministic behavior of mixed-criticality systems where Linux and real-time come together in a single PolarFire® device.

The Importance of Quantum Resistance for Critical Security Functions

In the world of quantum computers, signature verification methods must be resistant to quantum computer attacks. Veridify’s security methods can be implemented solely in software, allowing developers to easily implement critical security functions such as secure boot and secure firmware updates on platforms such as the PolarFire SoC FPGA. This webinar will also describe the power and scalability of DOME, a device on-boarding, management and enrollment platform for securing a PolarFire SoC FPGA throughout its life cycle.

Trust&GO for Any Cloud

Quickly and easily implement secure authentication for your Internet of Things design using our Trust&GO platform. We’ll show you how to streamline the process of enabling network authentication using our ATECC608A secure elements.

Secure Your Embedded Software’s Intellectual Property Using IAR Systems’ C-Trust

The importance of protecting your valuable intellectual property cannot be overstated. Join us for a live webinar where we'll discuss how to implement efficient IP protection using state-of-the-art cryptography techniques. We will also cover the latest legislation with regards to the IoT, recommended design guidelines for connected devices and how microcontroller (MCU) hardware is used to implement a root of trust. We will close with a walkthrough of the C-Trust tool, highlighting the simplicity of adding IP protection to your connected application.

Secure Boot for Microprocessors

From production to deployment to field updates, secure boot protects your microprocessor (MPU) solution from the very start. A secure boot is at the heart of a sustained hardware root of trust, ensuring the integrity of your device through its entire lifecycle. Join us for this webinar to learn how easy it can be to enable secure boot on your Microchip MPU.

Automotive Network Security

As in-vehicle networks continue to evolve in scale and complexity, more nodes are connected to the Controller Area Network Flexible Data-Rate (CAN FD) network, expanding the potential attack surface for hackers. In our live webinar, we’ll share tips and techniques for improving security fundamentals in the cars of tomorrow.

Platform Firmware Resiliency

Does your system boot from an SPI Flash? How do you protect your system from risk during the boot process and during firmware updates? How does your system detect and recover from corrupted Flash files? Join Microchip as we discuss the NIST 800-193 guidelines for Platform Firmware Resiliency.

PolarFire® SoC FPGA Secure Boot

PolarFire SoC FPGAs provide secure boot out of the box. Join us live to learn how you can roll out your own secure boot methodology using these devices’ secure, nonvolatile memory that is protected with physically unclonable function technology

Secure Authentication with TrustFLEX Secure Element and Microsoft Azure

The TrustFLEX secure element is a pre-configured device that can leverage Microchip’s secure provisioning service. It reduces cost and risk, preventing the exposure of your secret keys to software or third parties. During this session, we will review the various authentication use cases TrustFLEX offers by default and explain how you can implement device-to-cloud secure authentication using Microsoft Azure IoT Hub.

Wi-Fi® Security for Enterprise

Many of us are familiar with logging into home Wi-Fi networks using WPA2. Larger organizations, however, such as campuses and corporations, require more advanced security protocols. This webinar will highlight the different requirements for operating in strict security environments.

Quantum Public Key Infrastructure

Quantum computing can pose a threat to today’s Public Key Infrastructure (PKI). What’s the solution? Why, quantum-resistant cryptography, of course. Join us with our guest, Reza Azarderakhsh, CEO of PQSecure Technology, to discuss his company’s National Standards and Technology candidate for quantum PKI. Reza will additionally outline PQSecure’s quantum-resistant PKI solution running on Microchip PolarFire® FPGAs.

Secure Authentication with TrustFLEX Secure Element and Your Own Certificate Authority for AWS IoT

Discover the advantages of using the pre-configured ATECC608A TrustFLEX secure element along with the AWS IoT Core to implement secure authentication. We will discuss mutual authentication, OTA verification, secure boot assistance, key rotation, firmware IP protection and more. See how easy it is to go from prototype to provisioning to production with this security solution.

Symmetric Cryptography Primer

Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of symmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality. We will also provide real-world application examples to help you get started with using cryptography in your connected design.

GoodLock Project Using SAM L11 and TrustFLEX ATECC608 Secure Element

Join us as Future Electronics introduces the GoodLock, a unique and trusted board that can help any designer develop and test hardware security solutions for their embedded designs. This robust and cost-effective device’s advanced features include an on-board debugger/programmer, making it the perfect platform to add trust to your product.

Firmware Verification with TrustFLEX Secure Elements

Learn how the pre-configured ATECC608A TrustFLEX secure element can assist with secure boot for small microcontrollers, protect a public key during an Over the Air (OTA) update and help improve firmware intellectual property protection. This webinar will include transaction diagrams and a brief tutorial on how you can use the Trust Platform Design Suite software tool to implement your application.

Accessories Authentication with Secure Elements

If you need to protect your revenue, brand or intellectual property, join us to learn how our Trust Platform for CryptoAuthentication™ Family of secure elements can help with the authentication of accessories and peripherals. We will be using a pre-configured ATECC608A TrustFLEX secure element to walk you through a short tutorial on how use the Trust Platform Design Suite software tool to easily implement secure authentication.

Asymmetric Cryptography Primer

Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of asymmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality. We will also provide real-world application examples to help you get started with using asymmetric cryptography in your connected design.

The Virtual Primary Reference Time Clock: A Next-Generation Timing Architecture

Learn about The Virtual Primary Reference Time Clock: A Next-Generation Timing Architecture.