Cybersecurity Metrics: The Path To OT Security Maturity


In 2023, the cybersecurity challenges in the Operational Technology (OT) and Industrial Control Systems (ICS) landscape reached unprecedented levels. Ransomware, increasingly prevalent through new Ransomware-as-a-Service (RaaS) models, became a widespread and costly headache. While some might argue this exaggerates the risk, the growing demand for defenses is not overstated. 2024 continues to b... » read more

True Zero Trust Combats IC Manufacturing Security Challenges


The semiconductor manufacturing industry is facing a host of unprecedented technology and security challenges. A common catchphrase these days is that “data is the new oil.” Data is everywhere, in everything we do, and there is both good and bad associated with this trend. Data everywhere creates new security issues that need to be addressed to protect the integrity of your information and ... » read more

Building A Comprehensive Multicloud Security Strategy: A Zero-Trust Approach


The traditional, perimeter-based security model is no longer sufficient in today’s dynamic, multicloud deployments. A zero-trust (ZT) security model, in which no user or system is inherently trusted, is becoming essential—it is a foundational capability that underpins security for multicloud strategies. The ZT security model operates on the principle of “Never trust. Always verify.” ... » read more

Hardware Based Monitoring For Zero Trust Environments


A technical paper titled "Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments" was published by the Air Force Institute of Technology. Abstract "The interactions between software and hardware are increasingly important to computer system security. This research collects sequences of microprocessor control signals to develop machine ... » read more

Chips Can Boost Malware Immunity


Security is becoming an increasingly important design element, fueled by increasingly sophisticated attacks, the growing use of technology in safety-critical applications, and the rising value of data nearly everywhere. Hackers can unlock automobiles, phones, and smart locks by exploiting system design soft spots. They even can hack some mobile phones through always-on circuits when they are... » read more

Week in Review: IoT, Security, Auto


Products/Services Mentor, a Siemens Business, announced the release of the final phase of the Valor software New Product Introduction design-for-manufacturing technology, automating printed circuit board design reviews. The company has integrated DFM technology into the Xpedition software layout application. Arteris IP reports that Toshiba has taped out its next-generation advanced driv... » read more

Week in Review: IoT, Security, Auto


Cybersecurity Rambus signed a patent license agreement with Socionext, a designer of system-on-a-chip devices. Socionext will use Rambus technology in memory controllers, serializers/deserializers, and security applications. Netskope acquired Sift Security, adding 10 technical employees to its headcount of more than 500 people; financial terms weren’t revealed. Sift CEO Neil King was tapp... » read more