When It Makes Sense To Perform An Open Source Audit


Today's software is not created so much as assembled. The parts that serve as ingredients come from a variety of sources, but mostly from the millions of open source components freely available on the internet. This has enabled a digital transformation in several industries, helping market leaders speed their time to market, lower costs, and improve innovation. But what are the licensing and... » read more

CISO’s Guide To Sensitive Data Protection


Emerging data protection and privacy laws are causing organizations to scramble to implement strategies that address regulatory compliance and data security governance. And the SolarWinds software supply chain attack, in which attackers inserted a malicious back door into its network software release that later led to sensitive data exposure, further underscores the need to secure the DevSecOps... » read more

5G And AI Raise Security Risks For IoT Devices


This IDC Technology Spotlight, sponsored by Rambus, highlights the fifth generation of cellular network technology (5G) is scaling further in 2020, enabling a new wave of AI-powered end points. To remain competitive, manufacturers must implement enhanced security measures on edge and IoT devices designed for the increased performance in speed, latency, and connection density. Click here to r... » read more

Full Disk Encryption of Solid State Drives and Root of Trust


File encryption, file system encryption and full disk encryption (FDE) are methods offered by the industry to allow users to protect their data stored on non-volatile storage devices, such as Solid State Disks (SSD). The main feature of FDE is to protect stored system and user date from unauthorized reading, writing, alteration, moving or rolling back. However, extended security feature... » read more

Security for MEMS, Sensors


Napa, Calif. — The role of MEMS and sensors is growing as more devices are connected and more intelligence is added into those devices. But that has created its own set of issues involving security and privacy. “Our strategic landscape is changing,” observed Cynthia Wright, principal cybersecurity engineer at The MITRE Corp. and CEO of Synthus, during a keynote speech on day one of the... » read more

System Bits: Aug. 1


Quantum Computing Takes A Step Forward UCLA physicists have developed a technique for measuring and controlling the energy differences of electron valley states in silicon quantum dots, which they view as a key component of quantum computing. Joshua Schoenfield, a UCLA graduate student and one of the paper's authors, explained that "an individual qubit can exist in a complex wave-like m... » read more

Newer posts →