Author's Latest Posts


Hack the Vote: The Simulation of Vote Hacking at DEF CON


DEF CON, started in 1992 by the Dark Tangent, is the world’s largest running and underground hacking conference held annually at Caesar’s Palace in Las Vegas. It is a convention attended by various people from hackers, to journalists, to lawyers, to cybersecurity professionals, to federal government employees. At the second annual DEF CON Voting Village, a part of the convention that seeks ... » read more

The Blockchain – Not As Secure As You Think


The blockchain has the potential to touch all aspects of our everyday lives, from buying and trading cryptocurrency, to securing vital healthcare records, to proving that a tomato really is organic. The security challenges, specifically the vulnerability of private keys faced by the cryptocurrency market, prove that before the transformative impact of blockchain technology can be realized, a co... » read more

5 Reasons Why E-Commerce Sites Need A Token Gateway


Card-on-file is fundamental to the digital commerce ecosystem, as it facilitates the delivery of payment methods such as one-click ordering and recurring payments. As merchants and PSPs move towards implementing card-on-file EMV payment tokenization, solutions that simplify integration and ongoing maintenance, while adding additional value, can deliver considerable competitive advantages. ... » read more

The Rising Need for Satellite Security


Satellites today contain highly complex embedded microelectronics systems complete with processing, data storage, and data receiving/transmitting capabilities. Further, they are controlled by ground stations, computers in data centers. They are therefore susceptible to threats prevalent in cloud computing architectures including insider threats, malicious downloads, etc. As such, satellite secu... » read more

Real-Time Payments And How To Secure Them


In today’s digital, on-demand world, we have instant access to information, products and services. Digitization and digitalization has driven this change, and we are now accustomed to almost instant payments via cards, web services and apps. The development of instantaneous payments between bank accounts is therefore a natural evolution. Download this eBook to: Learn how to combat fra... » read more

Mobile Scan-And-Go Technology


Brick-and-mortar merchants are in the midst of a period of unprecedented disruption. Long-term structural trends mean that retailers must address decreasing revenues and escalating costs, while evolving the in-store experience to meet the demands of the connected consumer. For this reason, transformative technologies such as mobile scan-and-go solutions are coming to the fore, with deployments ... » read more

The CryptoManager Root Of Trust


In January 2018, Meltdown and Spectre were independently disclosed by multiple security researchers, including senior Rambus technology advisor Paul Kocher and senior Rambus security engineer Mike Hamburg. The two security flaws exploit critical vulnerabilities across a wide range of modern processors, including Intel, ARM and AMD. Notably, however, existing RISC-V processors remain unaffected ... » read more

Do Superconducting Processors Really Need Cryogenic Memories?


Cryogenic, superconducting digital processors offer the promise of greatly reduced operating power for server-class computing systems. This is due to the exceptionally low energy per operation of Single Flux Quantum circuits built from Josephson junction devices operating at the temperature of 4 Kelvin. Unfortunately, no suitable same-temperature memory technology yet exists to complement these... » read more

Tokenization Beyond Payments


Tokenization is a process by which sensitive data is replaced with unique identification credentials that retain all essential information about the data without exposing said sensitive data to attacks. While traditional payment methods pass critical identification information through several points, tokenization minimizes the amount of data a business needs to keep on hand. Becoming popular wi... » read more

The Rambus GDDR6 PHY IP Core


The JEDEC-compliant Rambus GDDR6 PHY IP Core is optimized for systems that require low-latency and high-bandwidth GDDR6 memory solutions. Available on leading FinFET process nodes, the PHY interface supports two independent channels, with each supporting 16 bits for a total data width of 32 bits. In addition, the PHY supports speeds up to 16Gbps per pin, providing a maximum bandwidth of up to 6... » read more

← Older posts