IoT Blog Written By Experts For Experts

Insights from Foundries.io on IoT device management, security, partners & more

Photo of Caio Pereira

Posted on Sep 2, 2025 by Caio Pereira

8 min read

Doesn’t it make sense to learn from the security mistakes that others have made, and avoid the pain which they had to go through in putting their mistake right? Here at Foundries.io, we like to share best practice for IoT device security as widely as we can, and to help our customers take advantage of the broad set of processes and capabilities for improving security provided in the FoundriesFactory™ platform. So here we have compiled a list of the most common security mis-steps that Foundries.io has seen, described the risk that they expose the device to, and a great way for others to avoid them.

Photo of Brendan Wood

Posted on Aug 26, 2025 by Brendan Wood

17 min read

Why identity is the foundation of IoT security The basic elements of security protection for IoT devices are familiar to most developers: A device must be safe from the risk of tampering, side-channel attacks, and other forms of physical attack A device must run authentic firmware which is protected against unauthorized changes The data on the device must be protected from unauthorized access, both at rest and in transit The device’s firmware must be capable of being updated remotely to maintain its protection against emerging cyber threats For a deeper dive into the fundamentals of securing connected devices, check out our guide on IoT security.

Photo of Brendan Wood

Posted on Jul 23, 2025 by Brendan Wood

15 min read

The challenge of scaling embedded Linux product development Developers of connected embedded and IoT products face a set of challenges which developers of enterprise computing systems or mobile phone apps do not experience

Photo of Brendan Wood

Posted on May 23, 2025 by Brendan Wood

18 min read

Foundations first: putting the basics of IoT security in place As Embedded and Internet of Things (IoT) devices grow in capability, making them more secure has become a critical priority for product manufacturers to master

Photo of Raul Muñoz

Posted on Apr 17, 2025 by Raul Muñoz

18 min read

IoT device management, applied to embedded devices based on a Linux® operating system (OS), is an important function for maintaining the performance and security of a fleet of devices in the field: it is the set of functions which allows for over-the-air (OTA) software upgrades and security patches throughout the life of an IoT or edge product.

Photo of Raul Muñoz

Posted on Feb 11, 2025 by Raul Muñoz

7 min read

It’s ironic that the mechanism used to deliver security updates to installed devices can itself make an entire fleet of devices vulnerable to attack.

Photo of Raul Muñoz

Posted on Dec 19, 2024 by Raul Muñoz

7 min read

Gather ‘round, developers, and listen to a chilling tale of digital terror. In the shadowy realm of the internet the Mirai botnet lurks ‐ a nightmare born from the most mundane of vulnerabilities .

Photo of Daiane Angolini

Posted on Nov 15, 2024 by Daiane Angolini

5 min read

Considering building a custom embedded Linux distribution? Four great reasons to choose the Yocto Project .

Photo of Milosz Wasilewski

Posted on Oct 24, 2024 by Milosz Wasilewski

3 min read

Testing video output from Qualcomm® RB3 Gen 2 dev kit in LAVA LAVA’s main goal is to drive testing on the DUT (Device Under Test) itself.

Photo of Caio Pereira

Posted on Sep 10, 2024 by Caio Pereira

4 min read

Developing a connected embedded device based on a Linux® distribution is never going to be easy.