Managing Web Application Security With Coverity


While security practitioners can and should play an active role in web application security, only developers are familiar enough with the code to fix software vulnerabilities. For this reason, security teams can most effectively prevent software vulnerabilities from entering production by equipping their development teams with the tools to fix security issues as they’re building applications.... » read more

Week In Review: Auto, Security, Pervasive Computing


Edge, cloud, data center Cadence added new verification IP (VIP) for hyperscalar data centers that supports CXL – Compute Express Link, HBM3, and Ethernet 802.3ck. The VIP are part of Cadence’s Verification Suite. Cadence also released IP for 56G long-reach SerDes on TSMC’s N7 and N6 process technologies. Many Mentor, a Siemens Business, IC design tools are now certified TSMC’s N5 a... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing — health An injectable biosensor may someday help measure signs of influenza. DARPA (the U.S. Department of Defense’s Defense Advanced Research Projects Agency) and digital health startup Profusa announced a study that uses Profusa’s Lumee Oxygen Platform to find ways to identify flu outbreaks, biological attacks and pandemics as much as three weeks earlier than curre... » read more

Week in Review: IoT, Security and Automotive


Internet of Things Western Digital Corp. and Codasip are working together on Western Digital’s SweRV Core EH1, which is a RISC-V core with a 32-bit, dual superscalar, 9-stage pipeline architecture. The core, launched earlier this is aimed at embedded devices supporting data-intensive edge applications, such as storage controllers, industrial IoT, real-time analytics in surveillance systems, ... » read more

A Trillion Security Risks


An explosion in IoT devices has significantly raised the security threat level for hardware and software, and it shows no sign of abating anytime soon. Sometime over the next decade the number of connected devices is expected to hit the 1 trillion mark. Expecting all of them to be secure is impossible, particularly as the attack surface widens and the attack vectors become more sophisticated... » read more

Mitigating DDoS Attacks With Secure IoT Endpoints


IoT life-cycle management should be implemented via a hardware root-of-trust to ensure secure updates of firmware and cryptographic keys. A hardware root-of-trust with a cryptographic identifier also allows each IoT device to be uniquely and cryptographically verified to determine if it is authorized to connect to a specific cloud service. Spoofed or unauthorized devices are easily identified b... » read more

April’19 Startup Funding: Corporate Gushers


It was another rich month for startups, large and small. In April’s top 11 funding rounds, five were investments by big corporations or corporate venture capital funds—an investor consortium led by the SoftBank Vision Fund, PayPal, Ford Motor, NTT DoCoMo, and HAPSMobile, a joint venture of SoftBank Group and AeroVironment. Those 11 investments totaled $3.74 billion. Intel Capital was als... » read more

IoT Device Security Makes Slow Progress


Semiconductor Engineering sat down with Chris Jones, vice president of marketing at Codasip; Martin Croome, vice president of business development at GreenWaves Technologies; Kevin McDermott, vice president of marketing at Imperas; Scot Morrison, general manager, embedded platform technology at Mentor, a Siemens Business; Lauri Koskinen, CTO at Minima; and Mike Borza, principal security technol... » read more

The Week In Review: IoT


Consortia Optimal+ said this week that it has joined the Industrial Internet Consortium. “The Industrial Internet of Things (IIoT) will have a tremendous impact on industries worldwide. The application of smart manufacturing, combined with the collection and analysis of in-use/field stage data, will deliver powerful insights to brand owners and enable them to achieve dramatic improvements in... » read more

New IP Risks


The world is being flooded with Internet-enabled devices, from smart toothbrushes to smart appliances to smart aircraft, and everything in between. Some of this is expected to be connected to the Internet, and some has been for quite some time. But devices such as smart toothbrushes and smart socks pose a whole new challenge. The issue is that even low-end chips need some sort of IP, but if ... » read more

← Older posts