New Approaches To Security


Different approaches are emerging to identify suspicious behavior and shut down potential breaches before they have a chance to do serious damage. This is becoming particularly important in markets where safety is an issue, and in AI and edge devices where the rapid movement of data is essential. These methods are a significant departure from the traditional way of securing devices through l... » read more

IoT Merging Into Data-Driven Design


The Internet of Things is becoming more difficult to define and utilize for an effective business strategy. While an increasing number devices send data to the cloud or some local server, so much data is being generated and moved around that new strategies are being developed to rethink what needs to be processed where. Back in 2013, when the IoT concept really began taking off, connectivity... » read more

Are Devices Getting More Secure?


Adding security into chip design is becoming more prevalent as more devices are connected to the Internet, but it's not clear whether that is enough to offset an explosion in connected "things." Security concerns have been growing for the past half-decade, starting with a rash of high-profile attacks on retail establishments, hotel membership clubs, and Equifax, one of the three top credit-c... » read more

Hardware Security Threat Rising


Martin Scott, senior vice president and CTO of Rambus, sat down with Semiconductor Engineering to talk about an increasing problem with security, what's driving it, and why hardware is now part of the growing attack surface. What follows are excerpts of that conversation. SE: With Meltdown and Spectre, the stakes have changed because the focus is not on using hardware to get to software. It'... » read more

Security Holes In Machine Learning And AI


Machine learning and AI developers are starting to examine the integrity of training data, which in some cases will be used to train millions or even billions of devices. But this is the beginning of what will become a mammoth effort, because today no one is quite sure how that training data can be corrupted, or what to do about it if it is corrupted. Machine learning, deep learning and arti... » read more

CEO Outlook On Chip Industry (Part 3)


Semiconductor Engineering sat down with Wally Rhines, president and CEO of Mentor, a Siemens Business; Simon Segars, CEO of Arm; Grant Pierce, CEO of Sonics; and Dean Drako, CEO of IC Manage. What follows are excerpts of that conversation. To view part one, click here. Part two is here. L-R: Dean Drako, Grant Pierce, Wally Rhines, Simon Segars. Photo: Paul Cohen/ESD Alliance SE: Securit... » read more

The Week in Review: IoT


Conferences Internet of Things World 2018 takes place next week at the Santa Clara Convention Center in Silicon Valley. Executives of GE Digital, The Chamberlain Group, and UPS will be among those giving keynote addresses during the four-day conference. Monday will see pre-conference workshops, followed by three days of keynotes, presentations, and an expo floor taking in 100,000 square feet o... » read more

IIoT Security Threat Rising


The rapid growth of the Industrial Internet of Things is raising questions about just how secure these systems are today, how to improve security, and who exactly should be responsible for that. These issues are interlaced with a shift in where a growing volume of data gets processed, the cost and speed of moving large amounts of data, and the increasing frequency and cost of attacks. "Di... » read more

Is The IoT Getting Safer?


The Internet of Things as we know has been in use in some form or another for at least a decade, but it is only in the past several years that it has achieved enough success that security has become an overriding issue. The fact that breaches are no longer shocking is a sign that attacks are becoming more common. Only the biggest and baddest hacks raise eyebrows, like today's hack of Germany... » read more

How To Secure The Network Edge


Microcontrollers, sensors, and other devices that live at the edge of the Internet must be protected against cyberattacks and intrusions just as much as the chips in data centers, network routers, and PCs. But securing those edge devices presents a swath of unique challenges, including the cost and availability of technology resources, as well as varying levels of motivation to solve these prob... » read more

← Older posts