Securing Your Test System


Test systems, like other industrial equipment, are vulnerable to cyber attacks. That requires a phased approach to cyber security, addressing the most likely threats first and communicating with suppliers to understand threats upstream in the supply chain. To read more, click here. » read more

Preventing IoT Edge Device Vulnerabilities


As an EDA toolchain provider, Mentor keeps a close eye on security issues that occur in the world of electronics. We see volumes of research centered on protecting complex SoCs from attacks and interesting studies about detecting malicious logic in these ICs. But, security issues around IoT edge devices are rarely mentioned in the literature. However, the projected billions of IoT edge devices ... » read more

Securing The Industrial Internet Of Things


Objects, sensors, actuators and controllers that were once designed for stand-alone operation are now increasingly connected by means of intelligent software and networks – forming the basis of the Industrial Internet of Things (IIoT). To be sure, GE defines the IIoT as “a network of a multitude of devices connected by communications technologies that results in systems that can monitor, co... » read more

Securing Automotive Over-The-Air (SOTA) Updates


Modern vehicles are essentially a network of networks – equipped with a range of embedded communication methods and capabilities. Consequently, there is broad industry consensus that vehicle cyber security should rank as a top priority for the automotive sector. In this context, automotive OEMs have begun to provide secure over-the-air (SOTA) updates for various systems. Recently, the non-... » read more

Tech Talk: MCU Acceleration


Tony Kozaczuk, director of Solutions Architecture at Flex Logix, talks about how to add programmability, efficiency, and speed into microcontrollers. https://youtu.be/rDZFjlut_N8 » read more

State Of The IoT


The Internet of Things represents many things to many people, and many of them are not good. For some it is either a laughingstock or a punching bag. For IT, it is a subject of derision because securing all connected devices at the edge is a nightmare. But in all cases, the general consensus is that the IoT has failed to live up to expectations and a level of hype not seen since the dot-com ... » read more

5 Pitfalls That May Kill The IoT


A couple of weeks ago I participated in a panel titled “The Road to a Trillion Devices” organized by Brian Fuller at Arm TechCon. His closing question was whether we will get to the projected trillion devices in twenty years. My answer was that we may even get there faster. His opening question was what the pitfalls would be to make it difficult to get to trillion devices in the next twenty... » read more

Different Approaches To Security


Everyone acknowledges the necessity for cybersecurity precautions, yet the world continues to be challenged by an invisible, inventive army of hackers. The massive data breach at Equifax was only the latest in a series of successful cyberattacks on the credit monitoring firm. Lessons learned from the previous breaches apparently didn’t mitigate this year’s embarrassment for the company. ... » read more

The Week In Review: Design


IP Cryptographic flaws have been discovered in the IEEE P1735 standard for encrypting IP and managing access rights. A team from the University of Florida found "a surprising number of cryptographic mistakes in the standard. In the most egregious cases, these mistakes enable attack vectors that allow us to recover the entire underlying plaintext IP." The researchers warn that an adversary coul... » read more

What Are You Going To Do About IoT Security?


We’re almost inured these days to cybercrime—the frequency of the hacks, the incomprehensible scale of compromised accounts, their contents vulture-pecked clean. It’s estimated that cybercrime steals half a trillion dollars each year from the global economy. Much of this is enabled by us as users, succumbing to phishing attacks and just being lazy about good password hygiene. The cybe... » read more

← Older posts Newer posts →