Author's Latest Posts


Securing The Road Ahead: MACsec Compliant For Automotive Use


Since the rise of connected and autonomous vehicles, the automotive industry has undergone a significant transformation. Modern vehicles are now equipped with advanced systems that communicate with each other and external infrastructures, enhancing the driving experience. However, this increased connectivity also brings heightened security risks. Unauthorized access to a vehicle’s systems can... » read more

Certified TRNG For Automotive


In today's tech-driven world, security and safety are more critical than ever, especially in the automotive sector. As cars become smarter and more connected, the need for robust cryptographic mechanisms to safeguard data and ensure secure communications grows. For decades, the automotive industry has been implementing numerous strategies to maintain vehicle safety. But now the industry is star... » read more

Post-Quantum Cryptography: Safeguarding The Future Of Digital Security


As technological advancements surge forward, the specter of quantum computing looms ever larger. While the promise of quantum computers holds the potential to revolutionize fields like weather forecasting, drug discovery, and fundamental physics, it also harbors a significant threat to our current cryptographic systems. The risk is not just a future concern; any sensitive data intercepted today... » read more

PCIe IP With Enhanced Security For The Automotive Market


The automotive industry is undergoing a rapid transformation, with connectivity and automation becoming integral components of modern vehicles. However, this increased connectivity also brings heightened risks. The automotive industry takes many measures to ensure safety for vehicles, but it is crucial to understand that these safety measures are ineffective if the vehicle's security is comprom... » read more

Navigating IoT Security


By Dana Neustadter (Synopsys), Ruud Derwig (Synopsys), and Martin Rösner (G+D) IoT expansion requires secure and efficient connectivity between machines. Integrated SIM technology and remote SIM provisioning can make this possible. Subscriber Identity Module (SIM) cards have been around for a long time, with Giesecke+Devrient (G+D) developing and delivering the first commercial SIM car... » read more

How To Safeguard Memory Interfaces By Design


By Dana Neustadter and Brett Murdock In 2017, the credit bureau Equifax announced that hackers had breached its system, unleashing the personal information of 147-million people. As a result, the company has settled a class action suit for $425 million to aid those impacted, including identity theft, fraud, financial losses, and the expenses to clean up the damage. Whether the threat is iden... » read more

Protecting High-Speed Network Traffic With MACsec


By Dana Neustadter and Jerry Lotto There is an ever-increasing demand for bandwidth, driven by an exponential growth in the number of devices connected to the cloud and a broadening variety of sensors, applications, and services, resulting in an explosion of data traffic. This in turn, drives the proliferation of high bandwidth interfaces such as Ethernet, PCIe/CXL, and DDR to sustain faster... » read more

Secure Interfaces In An Increasingly Connected World


The tremendous data and bandwidth growth in the era of supercomputing is driving technological advances across markets and is reshaping system-on-chip (SoC) designs supporting new compute architectures, more acceleration, and more storage. As high bandwidth interfaces including DDR, PCIe, CXL, Ethernet, HDMI and DisplayPort are proliferating and evolving from one generation to another, so does ... » read more

Enabling The Highest Levels Of SoC Security


The tremendous data and bandwidth growth in the era of supercomputing is driving technological advances across markets and is reshaping system-on-chip (SoC) designs supporting new compute architectures, more acceleration, and more storage. As high bandwidth interfaces including DDR, PCIe, CXL, Ethernet, HDMI and DisplayPort are proliferating and evolving from one generation to another, so does ... » read more

Security For SoC Interfaces Takes Center Stage In Data Protection


Due to today’s connected world, a high volume of valuable data, susceptible to tampering and physical attacks, is processed, stored, and moved between devices, cars, and data centers. And the number of connections continues to grow. Even with supply chain disruptions and the overarching effects of the COVID-19 pandemic on chip manufacturing, the number of global IoT connections grew by 8% in ... » read more

← Older posts