DOM-Based Cross-Site Scripting


DOM-based attacks are a misunderstood, serious, and pervasive source of risk in contemporary web applications. The language that drives the web, JavaScript, is easy to understand and hard to master; junior and senior developers routinely make mistakes. Mix difficulty to master with an enormous attack surface, and you have the perfect storm for widespread vulnerability. These risks expose web ap... » read more

The Next Big Chip Companies


Rambus’ Mike Noonen looks at why putting everything on a single die no longer works, what comes after Moore’s Law, and what the new business model looks like for chipmakers. https://youtu.be/X6Kca8Vm-wA » read more

NIST’s Considerations For ‘Cybersecuring’ The Internet Of Things


Experts at the National Institute of Standards and Technology (NIST) have kicked off an initiative to support the development and application of standards, guidelines, and related tools to improve the cybersecurity of connected devices and the environments in which they are deployed. NIST’s Cybersecurity for the Internet of Things (IoT) and Privacy Engineering Programs drafted a report ... » read more

Making Buildings Smarter


Calling a building “smart” implies that technology is embedded to make that building more efficient, useful, convenient and profitable. The goal is to program efficiency beyond what humans can provide. But “smart” also may imply a healthy dose of marketing hype. No one wants to live in a “dumb building,” but it's difficult to define what makes a building smart. And while much is ... » read more

Arm Enterprise Virtualization With Arm System IP, Backplane Integration And Performance


Virtualization has become ubiquitous across the infrastructure market, increasing efficiency and security, boosting productivity and reducing operating costs. However, system performance remains crucial to ensuring a virtualized environment does not affect the end user’s experience. Performance within this environment depends on a number of factors such as transaction bandwidth, latencies an... » read more

5 Reasons Why E-Commerce Sites Need A Token Gateway


Card-on-file is fundamental to the digital commerce ecosystem, as it facilitates the delivery of payment methods such as one-click ordering and recurring payments. As merchants and PSPs move towards implementing card-on-file EMV payment tokenization, solutions that simplify integration and ongoing maintenance, while adding additional value, can deliver considerable competitive advantages. ... » read more

The Revenge Of The Digital Twins


How do we verify artificial intelligence? Even before “smart digital twins” get as advanced as shown in science fiction shows, making sure they are “on our side” and don’t “go rogue” will become a true verification problem. There are some immediate tasks the industry is working on—like functional safety and security—but new verification challenges loom on the horizon. As in pr... » read more

Tineola: Taking A Bite Out Of Enterprise Blockchain


Enterprise blockchain adoption reached a fever pitch in 2018, but the security community has been late to the game of securing these platforms against attacks. We wanted to bridge the gap between the widespread use of enterprise blockchain platforms and the limited knowledge we have about their security by exploring the leading enterprise platform, Hyperledger Fabric, from the perspective of a ... » read more

The Security Penalty


It's not clear if Meltdown, Spectre and Foreshadow caused actual security breaches, but they did prompt big processor vendors like Intel, Arm, AMD and IBM to fix these vulnerabilities before they were made public by Google's Project Zero. While all of this may make data center managers and consumers feel better in one respect, it has created a level of panic of a different sort. For decades,... » read more

Enabling Cheaper Design


While the EDA industry tends to focus on cutting edge designs, where design costs are a minor portion of the total cost of product, the electronics industry has a very long tail. The further along the tail you go, the more significant design costs become as a percent of total cost. Many of those designs are traditionally built using standard parts, such as microcontrollers, but as additional... » read more

← Older posts Newer posts →