AI / ML
Why Quantum Cybersecurity is Imperative
Oct. 30, 2023
QuProtect leverages quantum-safe cryptography for secure communications wherever data travels, with complete cryptographic control for adaptive protection against classical and...
What’s So Special About Quantum Computing?
Oct. 27, 2023
Quantum computers are in the process of significantly expanding computing power, which creates opportunities for improving cybersecurity.
Cybersecurity from the Developer’s Seat
Oct. 26, 2023
In this first part of a three-part series, we talk to Skip Sanzeri, Co-Founder, Board Chair, and COO of QuSecure, about how cybersecurity is becoming more and more important in...
107262797 © Kasto80 | Dreamstime.com
Securing Your Software Supply Chain: Recognize the Risks and Solutions
Sept. 28, 2023
As software risk impacts organizations’ bottom lines, the prevalence of developers using open-source software in their projects poses software supply-chain challenges. This article...
Test & Measurement
Security Verification for Embedded Hardware Designs
Aug. 7, 2023
At the core of every secure product is robust hardware security, which must also address the threats created by hardware vulnerabilities.
More content from Cybersecurity
Air-Gapped Networks (Part 3): Cross-Domain Solutions and Off-Site Backups
July 20, 2023
Solutions are in demand to address the need to access isolated pockets of information as well as securely back up data off-site in case disaster strikes.
133915427 © Zerbor | Dreamstime.com
The Value of Common Criteria Certification for Securing Information
May 23, 2023
With the increasing number of cyberattacks and threats, securing data at rest (DAR) remains a top priority for virtually any organization, especially government and critical infrastruct...
Photo 246972011 © Stevanovicigor | Dreamstime.com
Building Cyber Threat-Detection Tools with Neuromorphic Computing
May 19, 2023
AI and ML research and technology provider Quantum Ventura will use BrainChip’s Akida technology to develop cyber threat-detection tools.
Air-Gapped Networks (Part 2): Moving Information
May 11, 2023
The ability to import, export, transport, and share information is extremely important, even for air-gapped networks.
Preventing and Detecting Cyberattacks on Connected Devices
May 4, 2023
This article delves into the regulations and best practices for IoT device cybersecurity by design.
ICs Protect System Infrastructure from Rogue Data
April 19, 2023
The MAXQ1065 ultra-low-power cryptographic controller with ChipDNA for embedded devices offers cryptographic functions for root of trust, authentication, secure boot and firmware...
Air-Gapped Networks (Part 1): Air-Gapped Madness
April 11, 2023
It’s not enough to have an air-gapped network—that network must be located in a secure facility, too.
FPGA Security Vulnerabilities and Countermeasures
March 10, 2023
This article explores the numerous risks associated with FPGA security and the recommended methods to keep the device secure.
Photo 172532163 © Jon Anders Wiken | Dreamstime.com
IoT Device Security: Regulatory and Standards Activity Drive 2023 Device Design
Feb. 17, 2023
IoT device security a feature no more? Recently enacted and upcoming cybersecurity regulations and standards will significantly impact how these devices are designed.
118502277 © Awargula | Dreamstime.com
The Security and Storage Outlook for 2023
Feb. 15, 2023
Before looking ahead to what 2023 has in store, let’s take a breath and think about what aspects from 2022 will impact the discussion.
193067636 © BiancoBlue | Dreamstime.com
Taking Action to Further Protect Automotive ECUs
Jan. 27, 2023
The automotive industry is putting forth measures to harden cybersecurity defenses against malicious hackers.
140704337 / Business © ProductionPerig | Dreamstime.com
Preparing Cryptography for the Risks of a Post-Quantum Computing World
Dec. 6, 2022
Quantum computers make intractable math problems look like first graders’ math exams. This means trouble for cryptographic practitioners as our current algorithms are essentially...
126273940 © Ekkasit919 | Dreamstime.com
Automotive Safety and Security on the Road
Oct. 27, 2022
As automotive SoCs become more complex, it can be challenging for automotive hardware suppliers to address the safety and security aspects independently. Still, engineers must...
What’s the Difference in Security Between Virtual Machines and Containers?
Oct. 20, 2022
Virtual machines and containers are widely used in embedded systems to consolidate workloads and enable DevSecOps, but which type of virtualization is more secure and is there...
Quantum Computing and Crypto Standards
Oct. 19, 2022
Rambus's Security Technologies Fellow explains how new encryption standards will address the problem of quantum-computing attacks.
88379421 © ibreakstock | Dreamstime.com
Entropy for Embedded Devices
Oct. 13, 2022
Sometimes, randomness is intentionally introduced for security reasons, and that’s accomplished by collecting entropy, which is a measure of unpredictability.
Cyber Threat Detection: 5 Top Priorities for Critical Infrastructure Security Leaders
Oct. 7, 2022
A critical infrastructure leader shares industry insights on how to detect and prevent cyber threats.
Agsandrew | Dreamstime.com
TechXchange: VMs, Unikernels, and Containers
Sept. 12, 2022
Developers have a variety of ways to partition their system for modularity and security
How to Keep Ahead of the Quantum-Computing Threat
July 14, 2022
Quantum computers pose a significant threat to information security, and both the NCSC and the NSA agree that the best mitigation against it is post-quantum cryptography.
Quantum Computing Forces New Public-Key Cryptography Standard
July 7, 2022
NXP helps standardize the next-generation of public-key security in a post-quantum cryptography world.
Image credit: Microchip Technology
Cortex-M23 MCU Unites Secure Subsystem with Arm TrustZone
June 28, 2022
Microchip said the combination is a step up from what its rivals are offering in the security department.
Cybersecurity Suite Protects Edge AI Models
June 28, 2022
With the expansion of AI into the cloud, there's an increasing need for robust security features and functions to protect AI models at the edge.
Open Source vs. Security and Risk: An Analysis Report
April 19, 2022
Synopsys’ Open Source Security and Risk Analysis report highlights the good and the bad.
Five Security "Must Haves" and the World Economic Forum
March 28, 2022
Secure Thingz's CEO, Haydn Povey, talks about the World Economic Forum’s Council on the Connected World announcement.
What the Ukrainian War Can Teach Us About Cybersecurity
March 25, 2022
Cybersecurity awareness is at an all-time high, reinforced by not only the threat environment from private entities, but also the current situation in Ukraine. We talk to Colin...
70926704 © Michael Borgers | Dreamstime.com
Get Outta Here: Securing Computing Systems by Storing Security Elsewhere
Feb. 5, 2022
This article details the architecture of the cybersecurity conflict and offers recommendations for how to tilt the scales in favor of the good guys.
Pravin Chakravarty, Dreamstime.com
Identifying Vulnerabilities in Cellular Networks
Oct. 27, 2021
This article takes an in-depth look at a systematic framework for the analysis of cellular-network protocols, involving a 4G LTE example, to enhance security.
What’s the Difference Between Ransomware and COVID-19?
July 27, 2021
Ransomware and COVID-19, both of which continue to headline the news, share common terminology and ideas, but they’re very different.
Kts | Dreamstime.com
How to Protect Your Digital Systems from the Quantum Apocalypse
June 21, 2021
Don’t let the potentially cataclysmic quantum-computing onslaught catch you and your systems off-guard. Take these steps to upgrade to a quantum-safe PKI security infrastructure...
Vchalup | Dreamstime.com
Is Your Ransomware Mistake Worth $5 Million?
May 17, 2021
The Colonial Pipeline is running again after the company paid a $5 million ransom.
Cybersecurity in the Operational Technology World
May 13, 2021
This article is part of the TechXchange: Cybersecurity As federal requirements for cybersecurity protection increase, so has the importance and need to demonstrate how OT is ...
The Cryptography Handbook
May 3, 2021
This series, which is designed to be a quick study guide for product development engineers, takes an engineering rather than theoretical approach.
Andrey Maslov, Dreamstime.com
Are We Doomed to Repeat History? The Looming Quantum Computer Event Horizon
April 22, 2021
Quantum computers are fast becoming a reality—but as soon as they do, our trusted methods of encryption will immediately become inadequate.
Detect Cybersecurity Threats Instantly with NVIDIA Morpheus
April 14, 2021
Morpheus uses machine learning to analyze and detect network attacks.
Denisismagilov | Dreamstime.com
Pre-Boot Security Gets More Secure
March 12, 2021
Lattice Semiconductor takes its Sentry security solution to the next level, with boot times improving by up to 400%.
Protecting Healthcare from Cyberattacks
Nov. 13, 2019
There’s lot to safeguard in healthcare’s computer networks, including patient safety and privacy.
Don’t Do It: Disabling SELinux
Dec. 19, 2018
Implementing SELinux can definitely improve the security of a system—but only if you actually use it.
11 Myths About TLS
Nov. 8, 2018
Transport Layer Security is the most widely used approach for security on the internet—the majority of secure transactions depend on it. But myths about TLS still abound.
Secure Boot: What You Need to Know
Jan. 29, 2018
Data security is more important than ever with the avalanche of connected devices, and implementing Secure Boot is a crucial step in making it happen.
What’s the Difference Between Device Hardening and Security Appliances?
Aug. 3, 2017
When it comes to protecting IoT devices from cyber attacks, each approach has supporters, but there are tradeoffs between “device-centric” and “appliance-centric.”
The Advantages of External Firewalls
June 13, 2017
Could external firewalls help prevent the spread of viruses and ransomware in legacy systems?
What’s the Difference Between Ransomware and Malware?
May 15, 2017
The number of systems being attacked using ransomware is on the rise. But is there a difference between ransomware and malware?
A Malware Experiment Foreshadows Factories Held for Ransom
Feb. 16, 2017
A paper describes a type of ransomware that could infect devices used to control power plants, water treatment facilities, and factory assembly lines, until a ransom is paid.
Dec. 2, 2016
Encryption is critical to network computer communication, secure storage, and a host of other security aspects to computing, including the Internet of Things (IoT).
EFF Photos | Flickr
Ransomware, Backdoors, and Privacy
Feb. 22, 2016
Technology editor Bill Wong talks about ransomware, backdoors, security, and privacy issues.
What is Really Happening in the World of Cybersecurity?
April 22, 2015
Systematic penetration of air-gapped systems, encryption cracking, and firmware reprogramming: Now is the time to invest in security.
SELinux 101: What You Should Know
March 25, 2015
Originally integrated into the mainline Linux kernel over a decade ago, SELinux is a framework and set of tools used to harden Linux systems against potential threats.