Knowledge center
Discover our latest news, customer cases and publications.
Bring Datacenter-Grade Manageability to the Edge with Supervyse OPF OpenBMC Firmware
As edge platforms scale to support AI and mission-critical workloads, operational complexity rises. Together with our partner Insyde Software, Logic Technology provides the answer: Supervyse® OPF. This production-ready OpenBMC solution shifts critical control, telemetry, and recovery to a secure, out-of-band...
EU CRA Compliance with Insyde Software at Embedded World 2026
The EU Cyber Resilience Act introduces mandatory cybersecurity requirements for embedded and edge products sold in the EU. From 2026 onwards, manufacturers are required to adopt secure-by-design development practices, manage vulnerabilities throughout the full product lifecycle and ensure software transparency....
InsydeH2O UEFI BIOS Accelerates Embedded and Edge Development Toward Embedded World 2026
InsydeH2O UEFI BIOS helps embedded and edge developers reduce platform complexity, lower bring-up risk and support long product lifecycles across x86 and Arm platforms.
NEW – SEGGER Launches emBoot-Secure: A Drop-In Solution for CRA-Compliant Firmware Updates
With the Cyber Resilience Act approaching, secure firmware updates are no longer optional. Discover how SEGGER’s emBoot-Secure provides a ready-made, CRA-compliant answer. This new solution ensures only manufacturer-signed code enters your device, combining robust security with flexibility across any transport...
The Top 5 Vulnerabilities in Embedded Software and How to Prevent Them
Radio Equipment Directive (RED) and The Cyber Resilience Act (CRA) are the European Union’s response to this new reality. They require manufacturers to prove that their software and firmware can withstand cyber threats , throughout the entire product lifecycle.
Why continuous monitoring for vulnerabilities is essential in embedded systems
Radio Equipment Directive (RED) and The Cyber Resilience Act (CRA) are the European Union’s response to this new reality. They require manufacturers to prove that their software and firmware can withstand cyber threats , throughout the entire product lifecycle.
