Lightweight Cryptography For The IoE


This is the age where technology is expected to do more, faster, anonymously, and often invisibly. And it's supposed to use less power, with smaller footprints, unobtrusively and intuitively. And all that needs to be protected with cryptography. That's the goal, at least. But as Simon Blake-Wilson, vice president of products and marketing for [getentity id="22671" e_name="Rambus"]' Cryptogra... » read more

Emerging Security Protocols


As the proliferation of mobile devices ramps up at escalating rates, securing these devices and the infrastructure they run on is becoming a top priority for both the hardware and the data that swirls within it. Traditional security platforms such as firewalls and antivirus programs are still a viable part of the security envelope, but the rapid emergence of zero-day/hour threats is somethin... » read more

Security Risk Escalating In 2015


Never has there been a more committed effort for malevolent entities to try to leak data, damage infrastructures, and wreak havoc on data essential to our lives. And never has there been a more opportunistic time for the security industry to put their best effort forward and answer the malfeasance challenge. So what is the current state of cyber security? "Unfortunately, there isn’t a l... » read more

ChaoLogix: Integrated Security


Semiconductor Engineering sat down with ChaoLogix’s chairman and CEO, Brian Kelly, and Chowdary Yanamadala, senior vice president of business development, to talk about the company's approach to securing semiconductors from side-channel attacks. SE: Given that the term “data security” has almost as many definition as there are braches, let start with a basic question: What does data s... » read more

DNA For Cryptography Chips


Counterfeit chips are here to stay. There are all kinds of reasons they should never be used, but certain segments of the chip market have more critical fallout from such chips than others. In most cases counterfeit chip use is unintentional. It simply goes undetected in the vast supply chain, sometimes with life-threatening repercussions. But whether in life-safety or low-end consumer produ... » read more

Implantable Chips


Implanting RFID chips into people has been a subject for debate and experimentation for nearly two decades. Back in 1998, the first implantable RFID device was injected into the hand of Professor Kevin Warwick. His hand became a transponder, and he could open doors that were designed to work with smart cards. In smart buildings, he was also able to turn on lights simply by entering into the ro... » read more

Hacker Bonanza Ahead


Always on, always connected—and therein lies the danger. With the world going to a 24/7 online presence, the hacker’s universe of opportunity is never closed. And once the IoT gets everyone and everything connected, hackers will have an even more bountiful playground. Just recently, HP did another one of its hacker studies. The Fortify application security unit did an analysis of what wi... » read more

What’s Holding Back The IoT


There is a new generation of heterogeneous devices and component modules being developed for the IoT. This, in turn, could create an exploding market within certain sectors of the hardware industry. Exact size predictions for this market vary greatly, but all of the firms making these predictions agree on one thing—it's going to be very big. A new report by Yole Developpement pegs the mar... » read more

Rethinking Big Data


You have to marvel at the sheer genius of what modern day, edge-of-the envelope marketing schemes can accomplish. For example, terms such as the [getkc id="76" comment="Internet of Things"], (also referred to as the Cloud of Things, or the Internet of Everything, or even Internet of Interconnect) have become sexy, interesting, exciting camouflage layers over the rather dull M2M industry. The... » read more

Next Bonanza: Security Holes


Security threats—both real and potential—are beginning to reshape the semiconductor business. These threats are drawing venture capitalists back into the industry as they race for the next big opportunity. They are blurring the lines between software and hardware, as threats grow in complexity at every level of a device and its myriad and sometimes perpetual connections to the outside wo... » read more

← Older posts Newer posts →