中文 English

Common Weakness Enumeration


Understanding potential design vulnerabilities up front can help prevent future cyberattacks. Jason Oberg, CTO at Tortuga Logic, talks with Semiconductor Engineering about why CWE is so important, when it needs to be considered, and why no hardware design is completely bulletproof. » read more

AppSec Risk: The Dangers And How to Manage Them


As software continues to deliver more features than ever before, its quality and security are increasingly crucial to the success of every organization. Building secure software makes business sense for a variety of reasons, including diminishing financial liability and improving competitive advantage. Keeping track of every software vulnerability, however, is taxing and time-consuming—and... » read more

Week in Review: IoT, Security, Auto


Internet of Things Apple purchased a portfolio of eight granted and pending patents that belonged to Lighthouse AI, a smart home security camera startup that ceased operations near the end of 2018. The portfolio was acquired at about the same time, according to the U.S. Patent & Trademark Office; financial terms weren’t revealed. Also not disclosed, as usual, is what Apple will do with t... » read more

Week in Review: IoT, Security, Auto


Internet of Things NXP Semiconductors provided its A71CH trust anchor to Google IoT Cloud, enabling authentication for Google IoT Cloud Core. The technology helps to secure edge devices for Internet of Things deployments. Separately, NXP announced the promotion of Kurt Sievers, executive vice president and general manager of the chip company’s automotive business, to president of NXP Semicon... » read more

System Bits: Nov. 14


Tracking cyber attacks According to Georgia Tech, assessing the extent and impact of network or computer system attacks has been largely a time-consuming manual process, until now since a new software system being developed by cybersecurity researchers here will largely automate that process, allowing investigators to quickly and accurately pinpoint how intruders entered the network, what data... » read more