中文 English

Author's Latest Posts


Cybersecurity Is A Journey


Hardware Is the Foundation of Your Security Posture Due to the inability to ‘patch’ silicon, failure to identify and remediate hardware vulnerabilities early comes with catastrophic consequences. However, most of the focus and investments in cybersecurity have historically been on device software and its administrators, not on securing the underlying hardware. Hardware Vulnerabilitie... » read more

Advancing The Maturity Of Your Hardware Security Program


Where are you today on the Hardware Security Maturity Model? Hardware security is a journey. LEVEL 1: Foundational Define security requirements and validate hardware security features are working with functional verification. LEVEL 2: Basic Introduce threat models and security verification requirements while also enabling hardware protection mechanisms. Ad hoc security verification beg... » read more