WP_Term Object
(
    [term_id] => 87
    [name] => Intrinsic ID
    [slug] => intrinsic-id
    [term_group] => 0
    [term_taxonomy_id] => 87
    [taxonomy] => category
    [description] => 
    [parent] => 14433
    [count] => 5
    [filter] => raw
    [cat_ID] => 87
    [category_count] => 5
    [category_description] => 
    [cat_name] => Intrinsic ID
    [category_nicename] => intrinsic-id
    [category_parent] => 14433
    [is_post] => 
)

The Best Way to Keep a Secret

The Best Way to Keep a Secret
by Bernard Murphy on 02-20-2019 at 7:00 am

Anyone knows that the best way to keep a secret is never to share it with anyone. Which works fine for your own most personal secrets, but it’s not very useful when you have to share with at least one other, such as in cyber-security. One such need, of enormous importance in the IoT, is authentication; are you who you claim to be? Seas of… Read More


CEO Interview: Pim Tuyls of Intrinsic ID

CEO Interview: Pim Tuyls of Intrinsic ID
by Daniel Nenni on 01-28-2019 at 7:00 am

Pim Tuyls is the Founder and CEO of Intrinsic ID. He initiated the work on Physical Unclonable Functions (PUFs) that forms the basis of Intrinsic ID’s silicon fingerprinting technology. The original work on PUFs was carried out at Philips Research, where Pim was Principal Scientist and managed the cryptography cluster. In 2008… Read More


IDT Invests in IoT Security

IDT Invests in IoT Security
by Daniel Nenni on 01-15-2019 at 7:00 am

As we are preparing for the “IoT Devices Can Kill and What Chip Makers Need to Do Now” webinar next week, Intrinsic-ID did a nice press release with Integrated Device Technology. IDT is one of the companies I grew up with here in Silicon Valley that pivoted its way to a $6.7B acquisition by Renesas.


IDT is focused on automotive,… Read More


IoT Devices Can Kill and What Chip Makers Need to Do Now

IoT Devices Can Kill and What Chip Makers Need to Do Now
by Daniel Nenni on 01-07-2019 at 12:00 pm

After the onslaught of IoT devices Christmas brought to the masses we really need to talk about security or lack thereof. Do me a favor and count how many IoT devices you have now? Our house IoT count is probably a bit higher than average due to my technology addiction but we are firmly in the double digits and the security breach stories… Read More


IoT Security Process Variation to the Rescue

IoT Security Process Variation to the Rescue
by Tom Simon on 11-12-2018 at 12:00 pm

Unique device identities are at the core of all computer security systems. Just as important is that each unique identity cannot be copied, because once copied they can be used illegitimately. Unique device IDs are used to ensure that communications are directed to the correct device. And they also provide the ability to encrypt… Read More