Navigating The Seas Of FIPS 140-2 CMVP With Certified Root Of Trust And TRNG IP


No captain worth his salt would set sail without an experienced navigator at his side. Likewise, when navigating the FIPS 140-2 CMVP process, it’s extremely valuable to have a partner that has already successfully made the journey. More specifically, working with a partner that offers CMVP-certified IP can streamline the process and increase the success of achieving CMVP certification of chip... » read more

Containing The Explosion In Data


The amount of data that could be kept for every design is gargantuan, but even that may not be enough these days as lifecycle management, continuous verification, regulatory requirements, and globalization add to the data that needs to be stored. But data has no value if it cannot be found or used in ways that provide more benefit than the cost of storing it. "Data management is not unique t... » read more

The Battle For Post-Quantum Security Will Be Won By Agility


By Thomas Poeppelmann and Martin Schlaeffer Due to their special features, quantum computers have the disruptive potential to replace existing conventional computers in many applications. They could, for example, calculate simulations of complex molecules for the chemical and pharmaceutical industry, perform complicated optimizations for the automotive and aviation industry, or create new fi... » read more

Will Automotive Ethernet Win?


As internal combustion engines are replaced by electric motors, and mechanical linkages increasingly replaced by electronic messaging, an in-vehicle network is needed to facilitate communication. Ethernet, amended for automotive and other time-sensitive applications, appears to be the network of choice. But is that choice a done deal? And will Ethernet replace all other in-car networks? The ... » read more

High-Quality Test And Embedded Analytics Are Vital For Secure SoCs


Applications such as smart cards and devices used in the defense industry require security features to ensure that sensitive data is inaccessible to outside agents. This used to be a niche requirement met through custom solutions. However, now that automotive and cyber-physical systems are proliferating, the requirements around secure test and monitoring are becoming mainstream. The current bes... » read more

Grappling With Smart City Security Issues


Security concerns are rising as cities seek to modernize services by connecting them to the internet and to each other, creating a widening attack surface that is a potential target for everything from disruption of services to ransomware demands. The goal of smart cities is to apply technology and intelligence to a variety of services to enable independent operation, real-time response, as ... » read more

Stepping Up To Greater Security


The stakes for security grow with each passing day. The value of our data, our devices, and our network infrastructure continually increases as does our dependence on these vital resources. Reports appear weekly, and often daily, that describe security vulnerabilities in deployments. There is a steady drumbeat of successful attacks on systems that were assumed to be protecting infrastructure, i... » read more

The Early Bird Gets More Secure Hardware


I’m sure you’ve heard the expression “The early bird gets the worm.” This proverb emphasizes the importance of starting something early to maximize the potential outcome. In terms of hardware security, this idiom is spot on. Cybersecurity shouldn’t only be about protecting the software from attacks. Hardware is just as important. Cyberattacks continue to advance significantly, prog... » read more

AppSec Risk: The Dangers And How to Manage Them


As software continues to deliver more features than ever before, its quality and security are increasingly crucial to the success of every organization. Building secure software makes business sense for a variety of reasons, including diminishing financial liability and improving competitive advantage. Keeping track of every software vulnerability, however, is taxing and time-consuming—and... » read more

Power/Performance Bits: Aug. 31


Securing memory Researchers at Columbia University suggest several ways to make computing more secure without imposing a system performance penalty. The efforts focus on memory security, specifically pointers. "Memory safety has been a problem for nearly 40 years and numerous solutions have been proposed. We believe that memory safety continues to be a problem because it does not distribute... » read more

← Older posts Newer posts →