IC Industry Waking Up To Security


By Jeff Dorsch & Ed Sperling Many people pay lip service to the concept of security in Internet of Things devices, software, and networks. That oversight is beginning to fade away, however, as companies begin digging into one of the broadest and most complex problems in the IoT age. Unlike other technology issues, which have been solved in increments, security is all-inclusive. While ... » read more

The Price Of Fear


Fear sells, and judging from the attendance numbers and the messages coming out of this week's RSA Conference, it's selling quite well. Increasing connectedness comes at a significant price, and apparently lots of people are willing to pay that price. Security has become a huge and growing business. Attendance is one indicator. There were an estimated 40,000 attendees at this year's conferen... » read more

More Than Just Plastic


The magnetic strip credit card era is coming to an end. The technology is antiquated, prone to security vulnerabilities, and has no self-destruct capability if lost or stolen. In its place are near-field technologies coupled with smart devices—think Apple Pay, Android Pay, Samsung Pay, digital wallets, MasterCard's PayPass—and now near-field communication (NFC) chips inside of cards. But... » read more

Securing IoE Gateways


When we talk about the [getkc id="260" comment="Internet of Everything"], (IoE) we have come to realize that it will really be made up of a lot of different “things. It will envelope everything from home automation to intelligent vehicles, to wearables, to industrial applications, military, infrastructure. The list is almost endless. And there is a lot of discussion about securing these “th... » read more

What’s Holding Back The IoT


There is a new generation of heterogeneous devices and component modules being developed for the IoT. This, in turn, could create an exploding market within certain sectors of the hardware industry. Exact size predictions for this market vary greatly, but all of the firms making these predictions agree on one thing—it's going to be very big. A new report by Yole Developpement pegs the mar... » read more

The Next Level Of Chip Security


As we move to that magic year, 2020, which is commonly being recognized as the year when the IoT is supposed to be in full bloom, the security issues just keep coming. The rate of cyber exploits continue to ramp up daily. Yet there seems to be just as much complacency about the [getkc id="76" comment="Internet of Things"] as there is about the Internet of today. It seems we are becoming desensi... » read more

Quantum Cryptography: A Magic Bullet For The IoT?


Quantum cryptography (QC for this discussion) theory—and it is still just theory—is potentially a very powerful security process that could be implemented for the dissemination of information over communications channels, using the principles of quantum mechanics. This is particularly intriguing because it is impossible to measure a photon, the fundamental element in the creation of QC secu... » read more

Malicious Code In The IoT


Fundamentally, malicious code families are initially comprised of one or more distinct malicious code samples. For clarity, malicious code is, globally used as an umbrella term for all types of malevolent program code. However, for this article, the term is being applied to static code and not morphing codes, which were discussed in a previous article. This discussion focuses on the type of mal... » read more

Threat Intelligence


The new buzz phrase in security is threat intelligence, a pre-emptive approach that combines forward-thinking, real-time awareness with both reactive and pre-emptive threat analysis philosophies. “The principle purpose of threat intelligence is to inform decision making and mitigate risk,” says Adam Vincent, Founder, and CEO of Cyber Squared, in Arlington, Va. While specific definitions ... » read more

The Next Big Threat: AI Malware


It’s an understatement to say that today’s cyber adversaries and cyber threats are reaching unparalleled levels of sophistication. Malevolent entries and their creators have, and will continue to, devise über-complex malware that will seem to take on an intelligence of its own. In fact, artificially intelligent malware is coming to a system near you. The ability of threats to morph, on ... » read more

← Older posts