Author's Latest Posts


The Next Big Threat: AI Malware


It’s an understatement to say that today’s cyber adversaries and cyber threats are reaching unparalleled levels of sophistication. Malevolent entries and their creators have, and will continue to, devise über-complex malware that will seem to take on an intelligence of its own. In fact, artificially intelligent malware is coming to a system near you. The ability of threats to morph, on ... » read more

M2M And The Internet Of Things


Securing the Internet of Things/Everything (IoT/E) is a bit like herding cats. There are so many elements that will make up the IoT/E, it may seem an insurmountable objective to corral them all into a single stable. By some accounts, we’re on our way toward 200 billion Internet-connected machines by 2020, according to IDC. Soon we will live in a world where automated machine-to-machine (M2M) ... » read more

It’s All IP In An SoC


[getkc id="43" comment="IP"] (IP) has become the major building blocks of complex, highly integrated systems on chips ([getkc id="81" kc_name="SoC"]s), which are found in almost every modern, intelligent electronic device. They have evolved into a one-chip solution that manages many to all of the functions, features, and applications that are found in the ubiquitous sea of today’s electronic... » read more

Securing Your Intestinal Data


Medical devices that use IP or wireless protocols to pass data and instruction between the host and the client aren’t all that unique. What is unique is the diversity, intensity, and depth of today’s security breaches, particularly in the face of the emerging Internet of Things/Everything (IoT/E) and the general lack of security across such medical devices. These elements can lay these medi... » read more

Locking Down The Chip


The crypto processor is poised to break into the mainstream SoC world. Lower costs for manufacturing, coupled with rising security concerns from increased connectivity and growing complexity have cracked open the door on this approach to locking down a chip. Crypto processors aren’t a new concept, but they generally have been reserved for high-end applications. Until recently, they have ju... » read more

Object Security And The IoT


Objects of the IoT will be anything and everything. It is conceivable that, eventually, almost every animate and inanimate object will have a cybernetic umbilical cord to it. IoT “things” take on virtual representations. They have intelligence. They are able to interact with each other as well as mine and store data about what and how objects are being used, what their status is, who and... » read more

Wireless Security Issues Grow


The Internet, as we know it today, is still mostly an information highway. However, even as we speak, more and more once autonomous, physical objects are becoming intelligent. That includes the obvious ones, such as today’s smart communications devices, to the not so evident ones, such as pacemakers, vehicles, audio/video, and environmental sensors. There are microscopic cameras that are swal... » read more

When Smart Cards Make Sense…


Smart cards, also referred to as hardware tokens, offer one of the highest levels of security within the framework of securable objects. This is for one obvious reason – it is disconnected from the interconnected world. Unlike wireless or hard-wired objects that require online connectivity for functionality, smart cards must be in physical, or near physical contact (contactless that requir... » read more

Heartbleed And The Internet Of Things


Heartbleed is not a country and western song, but many wish it were. It’s a programming glitch with the potential to cause disastrous and widespread compromises on seemingly secure data. By some estimates, the flaw in the heartbleed code has allowed hackers to collect personal data, including passwords, undetected, for as long as two years. Exactly how much data has been breached, and what... » read more

A Guide To Advanced Process Design Kits


The increasing complexity of design enablement has prompted manufacturers to optimize the design process. New tools and techniques, thanks to next-generation hardware and software, have provided a new platform for semiconductor and wafer design. Advanced PDKs are the solution and have been developed by foundries to optimize the design process and leverage and reuse intellectual property (IP) an... » read more

← Older posts Newer posts →