What practical steps can semiconductor manufacturers take to safeguard their operations in complex environments of specialized equipment and often-outdated OS?
The semiconductor industry’s technological advances make it a prime target for espionage, facilitating protective measures and design strategies to protect intellectual property...
This article discusses the risks involved with OTA updates and the best practices, including the six crucial steps to guarantee OTA updates' dependability and safety for electronic...
Regulations for IoT continue to evolve in the U.S. and around the world, as governments worldwide implement security laws to protect consumer privacy in the expanding IoT landscape...
Memory safety problems, particularly when it comes to unsafe usage of pointers, are widespread and can cause significant security breaches. and consequent economic damage. CHERI...
As software risk impacts organizations’ bottom lines, the prevalence of developers using open-source software in their projects poses software supply-chain challenges. This article...
Solutions are in demand to address the need to access isolated pockets of information as well as securely back up data off-site in case disaster strikes.
With the increasing number of cyberattacks and threats, securing data at rest (DAR) remains a top priority for virtually any organization, especially government and critical infrastruct...
IoT device security a feature no more? Recently enacted and upcoming cybersecurity regulations and standards will significantly impact how these devices are designed.
Quantum computers make intractable math problems look like first graders’ math exams. This means trouble for cryptographic practitioners as our current algorithms are essentially...
As automotive SoCs become more complex, it can be challenging for automotive hardware suppliers to address the safety and security aspects independently. Still, engineers must...
Virtual machines and containers are widely used in embedded systems to consolidate workloads and enable DevSecOps, but which type of virtualization is more secure and is there...
Sometimes, randomness is intentionally introduced for security reasons, and that’s accomplished by collecting entropy, which is a measure of unpredictability.
This article takes an in-depth look at a systematic framework for the analysis of cellular-network protocols, involving a 4G LTE example, to enhance security.