How Much Security Is Enough?


Semiconductor Engineering sat down to discuss the current state of [getkc id="223" kc_name="security"] and what must be done in the future, with Denis Noël, head of cyber security solutions at [getentity id="22499" e_name="NXP"]; Serge Leef, vice president of new ventures at [getentity id="22017" e_name="Mentor Graphics"]; Andreas Kuehlman, senior vice president and general manager of the soft... » read more

Is The IoT Safe To Use?


By Ernest Worthman & Ed Sperling Data security has been a problem since well before the invention the computer, and it has been getting progressively more difficult to contain every year for the past eight decades. It was made much worse when computing was decentralized with the introduction of the IBM PC in 1981, made worse again when networking was introduced into corporations by Novell'... » read more

What EDA’s Big 3 Think Now


In the past two months the CEOs of Cadence, Synopsys and Mentor Graphics delivered their annual high-level messages to their respective user groups. Semiconductor Engineering attended all of the speeches at these conferences, as it did in 2014 (see story here). From a high level, the big issues for CEOs last year were Moore's Law, the costs of design, the impact of low power, and business-... » read more

ChaoLogix: Integrated Security


Semiconductor Engineering sat down with ChaoLogix’s chairman and CEO, Brian Kelly, and Chowdary Yanamadala, senior vice president of business development, to talk about the company's approach to securing semiconductors from side-channel attacks. SE: Given that the term “data security” has almost as many definition as there are braches, let start with a basic question: What does data s... » read more

The Simple Way To Steal Data


Given all the propaganda that is currently floating around about what the IoT/E, CoT is or isn’t, will or won’t be, one thing is for sure – it will be flooded with autonomous objects, most of which most will be cheap, simple, and, as it stands now, unsecured. And, given the equation that: a) side channel attacks are relatively easy, and b) that many of the chips of IoT/E, CoT objects a... » read more

Newer posts →