- Cyber Purpose
- Posts
- Embedded World 2025 Recap
Embedded World 2025 Recap
Insights on Embedded & IoT Security, Emerging Tech Trends, and Highlights from Nürnberg.

Attending Embedded World 2025 in Nürnberg, Germany on March 12th was a first for me, and honestly, I wasn’t quite sure what to expect. But given how connected systems, cybersecurity, and exploring new ideas are such a big part of my daily work, it felt like the perfect opportunity to dive in and see what's going on in the industry. Spoiler: It was absolutely worth it.
After a classic 50-minute hunt for parking (yes, really), we finally made it into Hall 3A.
The vibe at the exhibition was incredible, and the place was buzzing. We didn’t come with a packed agenda or strict plan this time. Instead, I was with a small group of like-minded friends and my partner, and we decided to let curiosity lead the way. After a few minutes together, we agreed it would be more fun and flexible to explore on our own, following whatever caught our attention. And trust me, there was a lot to see for a half-day tour.
One thing I realized pretty quickly is that one day is definitely not enough for such a huge event. Next time, I will plan for more time. For instance, my partner was especially drawn to avionics electronics and mission-critical software, but that is a story for another post.
Conversations Across the Ecosystem
Throughout the event, I connected with a diverse set of stakeholders—either directly at their booths or through impromptu, on-site meetings. These included semiconductor leaders such as Intel, NXP, STMicroelectronics, Renesas, and Infineon; hardware ODMs from Asia; embedded and IT/OT security consultancies; as well as startups innovating in security software and next generation connectivity. Many discussions centered on how businesses can better leverage embedded systems, strengthen security, and stay competitive in an increasingly complex regulatory environment. A number of conversations also explored emerging use cases of connected technologies for low cost, small scale innovation in areas such as agriculture and hobbyist projects—where affordable IoT devices, basic connectivity, and private satellite communication are being used to build practical, impactful solutions with real utility.
What struck me most was the growing emphasis on collaboration across the supply chain, from established industry leaders to agile startups, each contributing bold new ideas—across both services and products. This convergence reflects a broader trend: embedded systems are becoming not only smarter but also more secure and adaptable. Innovators around the world are challenging traditional barriers and expanding access to do it yourself and cost effective product development approaches.
Highlights and Key Takeaways from Embedded World 2025
Walking the show floor this year, several key themes emerged, highlighting the direction in which embedded systems and connected technology are headed. These trends are vital not just for industry giants but also for anyone creating forward-thinking products:
Security-first design and IoT integration are quickly becoming the new standard. Whether for established tech sectors or DIY solutions, it’s clear that designing securely from the start is now a must, not just an afterthought.
Open-source software and open hardware architectures are gaining significant momentum. Platforms like RISC-V and Zephyr empower developers to innovate, experiment, and scale without being constrained by proprietary ecosystems. This ongoing shift toward democratization is transforming the landscape, offering greater flexibility and driving innovation across diverse industries.
AI at the edge has moved beyond being just a buzzword. Companies like Infineon, along with others in the industry, are gradually integrating AI capabilities directly into devices, unlocking the potential for real-time applications in resource-constrained environments. While the possibilities are promising, the full-scale adoption and maturation of these technologies are still in progress
Regulatory evolution is reshaping product development worldwide. As cybersecurity and compliance regulations become more stringent, even industry giants are turning to specialized security firms to build niche expertise and stay ahead. Collaborations between leading semiconductor companies and security consultancies underline the importance of designing for regulatory compliance from the start. It’s no longer optional—it’s foundational for creating successful connected products in today’s complex market.
Real-time secure updates are now essential. Companies like Intel and Renesas are setting the standard for hardware capabilities, making it crucial for every connected product team to prioritize them from the outset
In summary, these trends point to one undeniable fact: the embedded world is evolving rapidly, with security, openness, and intelligence at the edge at its core.
Now, let’s dive deeper into the topics that truly caught my attention.
Post-Quantum Cryptography in Practice
At Embedded World 2025, one of the most compelling developments was the progress of Post-Quantum Cryptography (PQC), moving from theoretical discussions to tangible, real-world applications. As quantum computing advances, widely used cryptographic methods like RSA and ECC (Elliptic Curve Cryptography) are expected to become vulnerable. Industry experts and NIST collaborators estimate that quantum computers could break these encryption methods within the next 10 to 15 years. This potential disruption has spurred efforts to prepare critical industries for a quantum-secure future.
For industries like automotive and healthcare, this transition is especially important. By 2030, over 50 million connected vehicles are expected to be shipped worldwide, turning cars into mobile data hubs. In healthcare, a growing number of medical devices now feature wireless or network connectivity. Ensuring the security of these systems is essential to protect user safety and sensitive data from emerging quantum threats.
What truly stood out at the event was seeing PQC algorithms in action on embedded control units and Internet of Things (IoT) devices. At Embedded World 2025, I observed Infineon Technologies showcasing their Optiga TPM, which incorporated hybrid encryption stacks—blending classical cryptographic methods with post-quantum algorithms. This hybrid approach enables a smoother transition to quantum-resistant encryption, ensuring backward compatibility with existing systems while preparing them for future quantum risks. Similarly, STMicroelectronics demonstrated PQC capabilities on their STM32 microcontroller series, implementing post-quantum cryptographic algorithms alongside traditional encryption, setting the stage for future-proofed security.
For businesses, this moment marks a significant turning point. With cybercrime projected to cost the world $10.5 trillion annually by 2025, building security from the ground up has never been more crucial. PQC provides a forward-thinking solution, enabling even devices with limited resources to remain secure against future quantum threats. As we move forward, companies that embrace PQC will not only protect their systems today but also ensure their long-term security and competitiveness.
The implementation of PQC in embedded systems is not just a technological upgrade—it is a strategic decision to guard against the risks of quantum computing. The companies that begin preparing for this shift now will be the ones that remain secure, trusted, and competitive in the years to come.

Left: STM's PQ demo.
Right: ST’s cybersecurity solutions with crypto accelerators in STM32 MCUs/MPUs.
The Rise of Open-Source Platforms
As the cybersecurity and embedded systems landscapes continue to evolve, a noticeable shift is taking place in how these systems are designed, driven by the rise of open-source platforms in both hardware and software. A key highlight at Embedded World 2025 was RISC-V, an open standard for processor architecture that is disrupting traditional hardware design.
RISC-V (pronounced "risk-five") stands apart from proprietary architectures like Intel’s x86 or ARM, which require expensive licenses and restrictive terms. As an open-source platform, RISC-V allows anyone—from startups to large corporations—to design, modify, and build processors without the burden of licensing fees or vendor lock-ins. “Security starts at the silicon level. Software can only be as secure as the hardware it’s running on.” This principle highlights why RISC-V is so compelling. Unlike legacy architectures, which often obscure transparency, RISC-V enables auditability and trust from the ground up. This focus on openness is especially critical as industries, particularly in automotive and industrial sectors, prioritize secure-by-design principles.
The appeal of open-source hardware extends beyond just cost savings. It fosters innovation and collaboration within the developer community, encouraging continuous improvement and fresh ideas from a global network of contributors. Major players like Google, NVIDIA, and Qualcomm are already incorporating RISC-V into their hardware solutions, demonstrating its growing impact across the tech industry.
Parallel to this hardware revolution, open-source software platforms like Zephyr are gaining momentum. Zephyr is a real-time operating system (RTOS) known for its lightweight, secure, and scalable nature. It’s particularly well-suited for IoT and resource-constrained systems, giving developers the flexibility to customize their operating systems to meet the unique needs of their projects. I had heard a lot from colleagues and friends involved in open-source working communities about Zephyr, which piqued my interest. Seeing it in action at the event reinforced the significant role it’s playing in empowering developers to build highly efficient embedded systems.
The rise of open-source platforms in both hardware and software is reshaping the embedded systems landscape. For companies aiming to build secure, transparent, and customizable systems, RISC-V and Zephyr are leading the way, making embedded systems more accessible and adaptable than ever before.

RISC-V and Zephyr Booths highlighting open-source hardware and software innovation at Embedded World 2025.
Edge AI Gets a Security Upgrade
Imagine a world where your phone, car, or even a traffic camera can make decisions, recognize faces, or detect problems without sending all that data to the cloud. That’s the promise of Edge-AI—bringing smart technology directly into devices like sensors, cameras, or control units, allowing them to work faster and smarter right where they are.
Why is this important? By processing data locally, Edge-AI eliminates the need to send it to distant servers, speeding up processes and increasing privacy. In industries like connected-smart mobility (autonomous cars), healthcare, and smart infrastructure—where real-time decisions are crucial—sensitive data can stay safe and local, reducing delays and enhancing privacy.
At Embedded World 2025, I saw Edge-AI in action, and while faster chips and improved power were impressive, what really stood out was the focus on security. When data is sent over networks, it creates more opportunities for cyberattacks. So, securing the devices on the edge—right where the data is collected—has become a top priority
One of the standout demonstrations at Embedded World 2025 came from Arrow Electronics. They showcased how Edge-AI could work using Lattice FPGAs and the NVIDIA Jetson platform. In the demonstration, the system first checked whether the device had been tampered with, ensuring everything was intact before proceeding with advanced tasks like real-time object or facial recognition. This process happened securely on the device itself, highlighting the potential of Edge-AI to enhance both security and performance.
What makes this approach significant is that it helps keep sensitive data—such as faces, medical images, or factory data—on the device, minimizing the risk of exposure. The data stays encrypted and secure, reinforcing the importance of a 'secure-by-design' approach, especially in fields like self-driving cars or medical technology, where security is paramount.
Another trend worth noting is federated learning, which allows devices to improve AI models without sending raw data to the cloud. This privacy-focused solution helps keep data local, but it also introduces new challenges in maintaining security. The key to addressing these challenges lies in ensuring that all data and models remain within trusted, encrypted environments, helping to safeguard everything.
The evolution from 'smart' to 'secure and smart' is a crucial step forward for Edge AI. For businesses, this means creating systems that are not just fast and efficient, but also secure, resilient, and built with privacy in mind from the outset. As Edge AI continues to develop, it will enable devices to make decisions independently, without constant reliance on the cloud, all while prioritizing security and privacy.

Infineon, Lattice, and Arrow Electronics Edge AI Demo showcasing real-time, secure AI processing with architecture overview.
Security, Regulation, and the Rise of Digital Sovereignty
At Embedded World 2025, it became clear that security has evolved from a technical issue to one that is deeply tied to strategy, regulation, and geopolitics. This shift is impacting the entire supply chain, affecting both large corporations and startups alike.
Today, security is a key factor in purchasing decisions. A low-cost component or board is not as valuable if the final product cannot be sold in key markets due to cybersecurity compliance issues or concerns about vulnerabilities. This is especially true for AI chips, autonomous software, and connectivity solutions like Bluetooth and Wi-Fi.
With new regulations like the EU Cyber Resilience Act coming into effect, companies are reassessing how they design products, select suppliers, and document compliance. While some may see this as a challenge, others view it as an opportunity to stand out in a competitive market. As geopolitical tensions and trade conflicts increase, the transparency of product security is becoming a major differentiator. Full transparency may not be required yet, but it is likely on the horizon. Companies that continue to hide their security practices may struggle to meet growing compliance demands.
As decisions about the security of connected products increasingly affect national resilience and market stability, it is clear that this is not just a technological shift—it is the start of a new era. Protecting these systems is vital for the safety, stability, and economic wellbeing of businesses and nations alike.

Reply