Mastering Cyber Awareness: Training For The Digital Battlefield


In today’s digital battlefield, cyber awareness is crucial for warfighters. To effectively prepare them, it’s essential to create realistic and detailed models of mobile networks, encompassing both physical and virtual infrastructure. This is where network modeling software comes into play, offering a high-fidelity approach to enhance cyber situational awareness. A high-fidelity modeling an... » read more

CMA/SPDM—An Additional Layer of Security for PCIe Transport


In today’s data-driven world, everyone is navigating a vast ocean of information that transcends across unsecured links and can easily fall prey to digital hackers. To keep our data safe, it is crucial to beef up security and make sure that only the right users can access our data. This article dives into the world of secure communication, where component measurement and authentication (CM... » read more

Unmasking Ransomware: Key Challenges And Strategic Responses In Critical Infrastructure Sectors – A Mid-2024 Review


Since 2015, ransomware attacks have become a significant threat that organizations and enterprises cannot afford to ignore, especially as critical infrastructure sectors (CI) increasingly embrace digitalization. Due to IT and OT convergence, even OT environments have become targets for ransomware groups. In 2023, ransomware attacks were the most frequent incidents faced by OT environments, fol... » read more

Chip Security Now Depends On Widening Supply Chain


Securing chips is becoming more challenging as SoCs are disaggregated into chiplets, creating new vulnerabilities that involve hardware and software, as well as multiple entities, and extending threats across a much broader supply chain. In the past, much of the cyber threat model was confined to either hardware or software, and where multiple vendors were involved, various chips were separa... » read more

Securing The Supply Chain: CMMC Essentials For Defense Contractors In OT Cybersecurity


Since September 2020, there have been several global supply chain attacks such as SolarWinds, Kaseya, NPM IconBurst, and Cyber Av3ngers Unitronics. Many of these incidents involved nation-state actors and resulted in significant disruptions and failures. In this threat landscape, the Department of Defense and critical infrastructure sectors have frequently and repeatedly come under attack, sust... » read more

Hardware Security Guide to Industry Standards and Regulations


In an era marked by relentless technological advancements, the significance of cybersecurity standards, regulations and guidelines has emerged as a critical dimension for companies engaged in the manufacturing of electronic devices. In this dynamic landscape, semiconductor manufacturers are compelled to navigate a complex web of standards and compliance requirements to ensure hardware security... » read more

Securing Semiconductor Manufacturing: Tackling Cybersecurity Challenges in SECS/GEM Protocols


As the global demand for electronics continues to surge, the semiconductor market has reached unprecedented revenue levels. The industry’s value chain comprises four critical stages, each presenting unique cybersecurity challenges: -Integrated Circuit Design Engineers design the layout and functionality of integrated circuits using Electronic Design Automation (EDA) tools. -Photomask P... » read more

Security Focus Widens To HW, SW, Ecosystems


Hardware security strategies are pushing much further left in the chip design flow as the number of vulnerabilities in complex designs and connected devices continues to grow, taking into account potential vulnerabilities in both hardware and software, as well as the integrity of an extended global supply chain. These approaches leverage the speed of fixing problems in software, and the effe... » read more

Cyber Threats To The SECS/GEM Protocol In Smart Manufacturing


Semiconductors are an indispensable part of modern electronic products and are also a fundamental basis for the development of the AI industry. This industry is crucial for global economic growth and national security. As the semiconductor industry transitions to Industry 4.0, the connection between production equipment and factory networks has expanded the attack surface, providing adversaries... » read more

Strategies For Defense Against Fuxnet ICS Malware


According to recent cybersecurity media reports, a new destructive ICS malware named Fuxnet has been discovered. This incident is allegedly linked to the Blackjack hacker group, which is associated with Ukrainian security agencies. It involved a major attack on Moscollector, a Moscow-based company responsible for managing critical infrastructure such as water supply, sewage treatment, and com... » read more

← Older posts