• Home >
  • Back Issues >
  • TechXchange >
  • Cybersecurity
  • Cybersecurity

    ID 124110546 © Maciek905 | Dreamstime.com
    code_dreamstime_l_124110546
    ID 382015243 © Michalsuszycki | Dreamstime.com
    cybersecurity_dreamstime_382015243
    Dreamstime_awargula_139764679 (generated with AI)
    dreamstime_awargula_139764679
    ID 123697425 © Alexandersikov | Dreamstime.com
    scalesofjustice_dreamstime_l_123697425

    More content from Cybersecurity

    Dreamstime_aerogondo_314841913
    dreamstime_aerogondo_314841913promo
    What practical steps can semiconductor manufacturers take to safeguard their operations in complex environments of specialized equipment and often-outdated OS?
    Oct. 22, 2024
    ID 159695842 © Aliia Chazova | Dreamstime.com
    schoolkid_dreamstime_l_159695842
    The FCC is taking an interest in keeping schools and libraries safe from digital threats with the backing of government funding.
    Oct. 10, 2024
    Agsandrew | Dreamstime.com
    Vm Promo Agsandrew Dreamstime Xxl 40383209
    Developers have a variety of ways to partition their system for modularity and security
    Sept. 4, 2024
    ID 139968771 © Suwin Puengsamrong | Dreamstime.com
    autonetworking_dreamstime_l_139968771
    As vehicles become more advanced, the need for increased security becomes a critical issue that MACsec looks to mitigate.
    Aug. 16, 2024
    Dreamstime_elen33_142387355
    promo_dreamstime_elen33_142387355
    The semiconductor industry’s technological advances make it a prime target for espionage, facilitating protective measures and design strategies to protect intellectual property...
    July 12, 2024
    137574951 © Sakkmesterke | Dreamstime.com
    ota_dreamstime_l_137574951
    This article discusses the risks involved with OTA updates and the best practices, including the six crucial steps to guarantee OTA updates' dependability and safety for electronic...
    June 25, 2024
    107745051 © Ekkasit919 | Dreamstime.com
    machinelearning_dreamstime_l_107745051
    Regulations for IoT continue to evolve in the U.S. and around the world, as governments worldwide implement security laws to protect consumer privacy in the expanding IoT landscape...
    May 16, 2024
    Codasip
    promo_codasipcheritechnology
    Memory safety problems, particularly when it comes to unsafe usage of pointers, are widespread and can cause significant security breaches. and consequent economic damage. CHERI...
    March 6, 2024
    107262797 © Kasto80 | Dreamstime.com
    Software Dreamstime L 107262797
    As software risk impacts organizations’ bottom lines, the prevalence of developers using open-source software in their projects poses software supply-chain challenges. This article...
    Sept. 28, 2023
    Alexandersikov | dreamstime.com
    Alexandersikov Dreamstime Xxl 126587946 T X
    This series of webinars addresses the security aspects and recommendations for IoT device design.
    Sept. 21, 2023
    DIGISTOR
    Promo Air Gapped
    Solutions are in demand to address the need to access isolated pockets of information as well as securely back up data off-site in case disaster strikes.
    July 20, 2023
    133915427 © Zerbor | Dreamstime.com
    Certification Dreamstime M 133915427
    With the increasing number of cyberattacks and threats, securing data at rest (DAR) remains a top priority for virtually any organization, especially government and critical infrastruct...
    May 23, 2023
    Photo 246972011 © Stevanovicigor | Dreamstime.com
    Cyberthreat Dreamstime L 246972011
    AI and ML research and technology provider Quantum Ventura will use BrainChip’s Akida technology to develop cyber threat-detection tools.
    May 19, 2023
    Dreamstime_Andrey-Cherkasov_77155550
    Dreamstime Andrey Cherkasov 77155550
    The ability to import, export, transport, and share information is extremely important, even for air-gapped networks.
    May 11, 2023
    Dreamstime_Technology-©-LagartoFilm_103749546
    Security Dreamstime Technology © Lagarto Film 103749546
    This article delves into the regulations and best practices for IoT device cybersecurity by design.
    May 4, 2023
    DIGISTOR
    Air Gapped Networks
    It’s not enough to have an air-gapped network—that network must be located in a secure facility, too.
    April 11, 2023
    eInfochips
    Promo Fpga Security Vulnerabilities And Countermeasures
    This article explores the numerous risks associated with FPGA security and the recommended methods to keep the device secure.
    March 10, 2023
    Photo 172532163 © Jon Anders Wiken | Dreamstime.com
    Dreamstime Promo 172532163
    IoT device security a feature no more? Recently enacted and upcoming cybersecurity regulations and standards will significantly impact how these devices are designed.
    Feb. 17, 2023
    118502277 © Awargula | Dreamstime.com
    Cybersecurity Dreamstime Xl 118502277
    Before looking ahead to what 2023 has in store, let’s take a breath and think about what aspects from 2022 will impact the discussion.
    Feb. 15, 2023
    193067636 © BiancoBlue | Dreamstime.com
    Av Dreamstime M 193067636 Promo
    The automotive industry is putting forth measures to harden cybersecurity defenses against malicious hackers.
    Jan. 27, 2023
    140704337 / Business © ProductionPerig | Dreamstime.com
    Quantum Dreamstime M 140704337
    Quantum computers make intractable math problems look like first graders’ math exams. This means trouble for cryptographic practitioners as our current algorithms are essentially...
    Dec. 6, 2022
    126273940 © Ekkasit919 | Dreamstime.com
    Dreamstime M 126273940 Promo
    As automotive SoCs become more complex, it can be challenging for automotive hardware suppliers to address the safety and security aspects independently. Still, engineers must...
    Oct. 27, 2022
    Dreamstime_Funtap-P_131525868
    Security Dreamstime Funtap P 131525868
    Virtual machines and containers are widely used in embedded systems to consolidate workloads and enable DevSecOps, but which type of virtualization is more secure and is there...
    Oct. 20, 2022
    88379421 © ibreakstock | Dreamstime.com
    Nccc Dreamstime M 88379421 Promo
    Sometimes, randomness is intentionally introduced for security reasons, and that’s accomplished by collecting entropy, which is a measure of unpredictability.
    Oct. 13, 2022
    pexels-tima-miroshnichenko-5380642
    Pexels Tima Miroshnichenko 5380642 Promo
    A critical infrastructure leader shares industry insights on how to detect and prevent cyber threats.
    Oct. 7, 2022
    Image credit: Microchip Technology
    Microchip Secure Mcu Promo
    Microchip said the combination is a step up from what its rivals are offering in the security department.
    June 28, 2022
    Synopsys Ossra Promo
    Synopsys’ Open Source Security and Risk Analysis report highlights the good and the bad.
    April 19, 2022
    70926704 © Michael Borgers | Dreamstime.com
    Cybersecurity Promo
    This article details the architecture of the cybersecurity conflict and offers recommendations for how to tilt the scales in favor of the good guys.
    Feb. 5, 2022
    Pravin Chakravarty, Dreamstime.com
    Cyber Security Pravin Chakravarty Dreamstime L 178802456
    This article takes an in-depth look at a systematic framework for the analysis of cellular-network protocols, involving a 4G LTE example, to enhance security.
    Oct. 27, 2021
    Whats The Difference 583806094
    Ransomware and COVID-19, both of which continue to headline the news, share common terminology and ideas, but they’re very different.
    July 27, 2021