IIoT Security Threat Rising

The rapid growth of the Industrial Internet of Things is raising questions about just how secure these systems are today, how to improve security, and who exactly should be responsible for that. These issues are interlaced with a shift in where a growing volume of data gets processed, the cost and speed of moving large amounts of data, and the increasing frequency and cost of attacks. "Di... » read more

Is The IoT Getting Safer?

The Internet of Things as we know has been in use in some form or another for at least a decade, but it is only in the past several years that it has achieved enough success that security has become an overriding issue. The fact that breaches are no longer shocking is a sign that attacks are becoming more common. Only the biggest and baddest hacks raise eyebrows, like today's hack of Germany... » read more

How To Secure The Network Edge

Microcontrollers, sensors, and other devices that live at the edge of the Internet must be protected against cyberattacks and intrusions just as much as the chips in data centers, network routers, and PCs. But securing those edge devices presents a swath of unique challenges, including the cost and availability of technology resources, as well as varying levels of motivation to solve these prob... » read more

Who’s Responsible For Security?

Semiconductor Engineering sat down to discuss security issues and how to fix them with Mark Schaeffer, senior product marketing manager for secure solutions at Renesas Electronics; Haydn Povey, CTO of Secure Thingz; Marc Canel, vice president of security systems and technologies at [getentity id="22186" comment="Arm"]; Richard Hayton, CTO of Trustonic; Anders Holmberg, director of corporate dev... » read more

The Week in Review: IoT

Products/Services Vancouver, B.C.-based Riot Micro has brought out the RM1000 baseband modem chip for the cellular Internet of Things. The device is said to use Bluetooth Low Energy and Wi-Fi techniques to provide low-power and lower-cost connectivity, like short-range wireless systems. The chip is being marketed to module manufacturers and OEMs developing narrowband IoT and LTE-M products for... » read more

Securing Smart Homes

One year after Mirai malware hijacked more than 100,000 connected devices for its botnet and launched a denial of service attack — which briefly blocked access to popular sites such as Netflix, PayPal, Amazon and Twitter — [getkc id="76" kc_name="IoT"] device makers are just beginning to get smarter about home security. Security concerns reach deeper into the home than just the Internet ... » read more

Focus Shifts To System Quality

For the past decade, many semiconductor industry insiders predicted that software would take over the world and hardware would become commoditized. The pendulum seems to have stopped, and if anything, it is reversing course. Initial predictions were based on several advantages for software. First, software is easier to modify and patch. Second, universities turn out far more software develop... » read more

Playing Catch Up With IoT Security

While the benefits of the Internet of Things (IoT) are clear, security hasn’t managed to keep up with the rapid pace of innovation and deployment. As the U.S. Department of Homeland Security (DHS) recently stated, an unsecured IoT ecosystem introduces real-world risks that include malicious actors manipulating the flow of information to and from network-connected devices or tampering with dev... » read more

IoT Security Risks Grow

Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in [getentity id="22186" e_name="ARM's"] Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at [getentity id="22819" comment="GlobalFoundries"]; Chowdary Yanamadala, senior vice president of business development at Cha... » read more

Testing For Security

Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

← Older posts