Keeping Key Management Clear And Physical


Fundamental to all digital security systems is the ability to turn sensitive data into what looks like random incomprehensible jibberish and turn it back again into the same original information. But that is not all there is to it. You should be able to do that second bit of getting the original text only if you are allowed to do so. A classic way to deal with this problem is by using another s... » read more

Authentication In The IoT Age


We all know passwords are a problem. We have too many of them to remember, but too many of them are reused to make them secure. No surprise that they are the root cause of the vast majority of data breaches. Fortunately, clever minds are working at ways to replace them and they have come together to create the FIDO (Fast IDentity Online) Alliance. The FIDO Alliance was created in 2013 to de... » read more

Week in Review – IoT, Security, Autos


Products/Services Rambus entered an exclusive agreement to acquire the Silicon IP, Secure Protocols, and Provisioning business from Verimatrix, formerly known as Inside Secure. Financial terms were not revealed. The transaction is expected to close this year. Rambus will use the Verimatrix offerings in such demanding applications as artificial intelligence, automotive, the Internet of Things, ... » read more

Who’s Responsible For Security?


Semiconductor Engineering sat down to discuss security issues and how to fix them with Mark Schaeffer, senior product marketing manager for secure solutions at Renesas Electronics; Haydn Povey, CTO of Secure Thingz; Marc Canel, vice president of security systems and technologies at [getentity id="22186" comment="Arm"]; Richard Hayton, CTO of Trustonic; Anders Holmberg, director of corporate dev... » read more