Power Grids Under Attack


Cyberattacks are becoming as troublesome to the electrical power grid as natural disasters, and the problem is growing worse as these grids become more connected and smarter. Unlike in the past, when a power outage affected just the electricity supplied to homes and businesses, power grids are becoming core elements of smart cities, infrastructure, and safety-related services. Without power,... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing An outage in network equipment at the US-EAST-1 Region of Amazon Web Services this week reminded customers of the downside to having every appliance run via a data center. Users accessing apps tied to AWS on the East coast found services did not work, including Alexa, Ring, smart appliances, some Amazon warehouses and packaging delivery, web APIs such as Slack, and some str... » read more

Keeping Key Management Clear And Physical


Fundamental to all digital security systems is the ability to turn sensitive data into what looks like random incomprehensible jibberish and turn it back again into the same original information. But that is not all there is to it. You should be able to do that second bit of getting the original text only if you are allowed to do so. A classic way to deal with this problem is by using another s... » read more

Bridging The Gap Between Smart Cities And Autonomous Vehicles


Smart city planners and carmakers are wrestling with similar problems and goals, but they are working at very different paces and often with different technologies — despite the fact that these two worlds will need to be bridged in order to be useful. Moving traffic optimally in urban areas is critical for reducing energy consumption and accidents, and for moving emergency vehicles through... » read more

Hardware Security For AI Accelerators


Dedicated accelerator hardware for artificial intelligence and machine learning (AI/ML) algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle valuable data and models, and face a growing threat landscape putting AI/ML assets at risk. Using fundamental cryptographic security techniques performed by a hardware root of trust can safeguard these as... » read more

Vehicle Communications Network Is Due For Overhaul


The Controller Area Network (CAN), one of the main communications networks in an automobile, is headed for a security overhaul — if not a wholesale replacement. Initially devised in the 1980s to allow electronic components in a vehicle to communicate directly without a central computer in between, the CAN bus has become a growing security risk as more functions are automated and integrated... » read more