Can Your Doorbell Be Spoofed?


Voice anti-spoofing is a set of techniques designed to prevent scam attempts that involve mimicked voices and improve the overall UI/UX experience of VUI systems by preventing accidental triggers. These techniques are particularly important to prevent issues related to: Speech Synthesis (SS): This type of attack employs a computer-simulated voice Voice Conversion (VC): In this attack,... » read more

2024 Open Source Security And Risk Analysis Report


This report offers recommendations to help creators and consumers of open source software manage it responsibly, especially in the context of securing the software supply chain. Whether a consumer or provider of software, you are part of the software supply chain, and need to safeguard the applications you use from upstream as well as downstream risk. In the following pages, we e... » read more

The Crisis of Convergence: OT/ICS Cybersecurity 2023


In 2023, many forces came into play that led to unprecedented cybersecurity challenges in the OT/ICS domain. Not only did the issues of IT-OT convergence and Ransomware-as-a-Service persist, but geopolitical tensions precipitated increased state-sponsored and civilian hacker activities as well. In this report, TXOne Networks worked with Frost & Sullivan to survey 405 key IT and OT security ... » read more

Enhancing HMI Security: How To Protect ICS Environments From Cyber Threats


HMIs (Human Machine Interfaces) can be broadly defined as just about anything that allows humans to interface with their machines, and so are found throughout the technical world. In OT environments, operators use various HMIs to interact with industrial control systems in order to direct and monitor the operational systems. And wherever humans and machines intersect, security problems can ensu... » read more

Securing The Food Supply: Industrial Cybersecurity In The Food And Beverage Sector


This publication unpacks the various aspects of the food and beverage industry in relation to cybersecurity. The angles we explore are: Cyber Threats: The food, beverage, and agriculture sectors have become targets for cyber threats at an increasing rate, with 2021 standing out as the most severe. Alarmingly, this uptick did not have a corresponding decrease in the following years, remain... » read more

Security For AI And AI For Security


The aspect for AI was drastically changed after the introduction of ChatGPT from 2022. Even during 2010s, the question of whether the evolution of AI can overcome human’s logical thinking had been researched and developed (e.g., IBM Watson and Google AlphaGo). Now, a few years later from these results, everyone can experience the future potential of AI from the advent of generative AI. Major ... » read more

Why Semiconductor Security Is More Important Than Ever in 2024


When I think about the state of semiconductor security today compared to when I joined Cycuity in 2020, I can safely say that chip security conversations are now taking place with greater frequency and urgency. Over the past year, I observed three trends that I expect will continue and accelerate in 2024: Continued occurrence of new and increasingly sophisticated cyber incidents Emergen... » read more

Cybersecurity Metrics: The Path To OT Security Maturity


In 2023, the cybersecurity challenges in the Operational Technology (OT) and Industrial Control Systems (ICS) landscape reached unprecedented levels. Ransomware, increasingly prevalent through new Ransomware-as-a-Service (RaaS) models, became a widespread and costly headache. While some might argue this exaggerates the risk, the growing demand for defenses is not overstated. 2024 continues to b... » read more

FeFET Memory Encrypted Inside The Storage Array


A new technical paper titled "Embedding security into ferroelectric FET array via in situ memory operation" was published by researchers at Pennsylvania State University, University of Notre Dame, Fraunhofer IPMS, National University of Singapore, and North Dakota State University. Abstract "Non-volatile memories (NVMs) have the potential to reshape next-generation memory systems because of... » read more

Hardware-Based Methodology To Protect AI Accelerators


A technical paper titled “A Unified Hardware-based Threat Detector for AI Accelerators” was published by researchers at Nanyang Technological University and Tsinghua University. Abstract: "The proliferation of AI technology gives rise to a variety of security threats, which significantly compromise the confidentiality and integrity of AI models and applications. Existing software-based so... » read more

← Older posts Newer posts →