New Approaches To Security


Different approaches are emerging to identify suspicious behavior and shut down potential breaches before they have a chance to do serious damage. This is becoming particularly important in markets where safety is an issue, and in AI and edge devices where the rapid movement of data is essential. These methods are a significant departure from the traditional way of securing devices through l... » read more

Miles Wide And High Security


Talk about security in autonomous vehicles seems to have subsided. It shouldn't, because the problem is far from solved. In fact, it's not just one problem. It's layers upon layers of problems spread out across all roadways, technology design houses, IP developers, network infrastructure, and the entire supply chain. And even though one vehicle's security may be bulletproof, it may be no... » read more

Are Devices Getting More Secure?


Adding security into chip design is becoming more prevalent as more devices are connected to the Internet, but it's not clear whether that is enough to offset an explosion in connected "things." Security concerns have been growing for the past half-decade, starting with a rash of high-profile attacks on retail establishments, hotel membership clubs, and Equifax, one of the three top credit-c... » read more

IIoT Security Threat Rising


The rapid growth of the Industrial Internet of Things is raising questions about just how secure these systems are today, how to improve security, and who exactly should be responsible for that. These issues are interlaced with a shift in where a growing volume of data gets processed, the cost and speed of moving large amounts of data, and the increasing frequency and cost of attacks. "Di... » read more

Is The IoT Getting Safer?


The Internet of Things as we know has been in use in some form or another for at least a decade, but it is only in the past several years that it has achieved enough success that security has become an overriding issue. The fact that breaches are no longer shocking is a sign that attacks are becoming more common. Only the biggest and baddest hacks raise eyebrows, like today's hack of Germany... » read more

How To Secure The Network Edge


Microcontrollers, sensors, and other devices that live at the edge of the Internet must be protected against cyberattacks and intrusions just as much as the chips in data centers, network routers, and PCs. But securing those edge devices presents a swath of unique challenges, including the cost and availability of technology resources, as well as varying levels of motivation to solve these prob... » read more

Imperfect Silicon, Near-Perfect Security


Some chipmakers, under pressure to add security to rapidly growing numbers of IoT devices, have rediscovered a "fingerprinting" technique used primarily as an anti-counterfeiting measure. [getkc id="227" kc_name="Physically unclonable functions"] (PUFs) are used to assign a unique identification number based on inconsistencies in the speed with which current causes a series of logic gates to... » read more

Security For Embedded Electronics


The embedded systems market is expected to enjoy steady growth in the near future—provided those systems can be adequately secured. One of the biggest challenges for embedded devices and systems, especially those employed in the [getkc id="76" comment="Internet of Things"], is adequately protecting them from increasingly sophisticated hacking. This is a new tool for criminal enterprises, a... » read more

Cyber Security In The Era Of The Smart Home


The global smart home market is projected to reach at least $40 billion in value by 2020. Perhaps not surprisingly, OEMs are inadvertently creating major security risks in their rush to market by shipping smart home products with inadequate security and unpatched vulnerabilities. As ABI Research Analyst Dimitrios Pavlakis notes, ignoring cybersecurity at the design level provides a wide-open do... » read more

IoT Security Challenges, Opportunities


The specter of cybersecurity is haunting the Internet of Things—or more specifically, the lack of it. Big companies in information technology and telecommunications have embraced the [getkc id="76" kc_name="IoT"] as a significant business opportunity, and the field is inspiring hundreds of startups in Silicon Valley and elsewhere. Venture capitalists hungrily eye the IoT, betting on which ... » read more

← Older posts