800x100 Webinar (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 300
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 300
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Breker Tips a Hat to Formal Graphs in PSS Security Verification

Breker Tips a Hat to Formal Graphs in PSS Security Verification
by Bernard Murphy on 04-16-2020 at 6:00 am

Breker security tables

It might seem paradoxical that simulation (or equivalent dynamic methods) might be one of the best ways to run security checks. Checking security is a problem where you need to find rare corners that a hacker might exploit. In dynamic verification, no matter how much we test we know we’re not going to cover all corners, so how can it… Read More


Private Datacenter Safer than the Cloud? Dangerously Wrong.

Private Datacenter Safer than the Cloud? Dangerously Wrong.
by Bernard Murphy on 04-02-2020 at 6:00 am

Cloud Security

The irony around this topic in the middle of the coronavirus scare – when more of us are working remotely through the cloud – is not lost on me. Nevertheless, ingrained beliefs move slowly so it’s still worth shedding further light. There is a tribal wisdom among chip designers that what we do demands much higher security than any other… Read More


Security in I/O Interconnects

Security in I/O Interconnects
by Mike Gianfagna on 03-25-2020 at 10:00 am

shutterstock 1221815029

I got a chance to chat with Richard Solomon at Synopsys recently about a very real threat for all of us and what Synopsys is doing about it. No, the topic isn’t the Coronavirus, it’s one that has been around a lot longer and will continue to be a very real threat – data and interconnect security.

First, a bit about Richard. He is the technical… Read More


There is No Easy Fix to AI Privacy Problems

There is No Easy Fix to AI Privacy Problems
by Matthew Rosenquist on 03-14-2020 at 8:00 am

There is No Easy Fix to AI Privacy Problems

Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems.

Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access to even greater volumes of data as part of the inference processing while in operation. … Read More


An Objective Hardware Security Metric in Sight

An Objective Hardware Security Metric in Sight
by Bernard Murphy on 03-11-2020 at 6:00 am

Metrics

Security has been a domain blessed with an abundance of methods to improve in various ways, not so much in methods to measure the effectiveness of those improvements. With the best will in the world, absent an agreed security measurement, all those improvement techniques still add up to “trust me, our baby monitor camera is really… Read More


Cryptocurrency Fraud Reached $4.3 Billion in 2019

Cryptocurrency Fraud Reached $4.3 Billion in 2019
by Matthew Rosenquist on 02-23-2020 at 6:00 am

Cryptocurrency Fraud Reached 4.3 Billion in 2019

Cryptocurrency fraud is aggressively on the rise and topped over $4 billion last year, according to the security tracking company Chainalysis.

This is especially shocking to those who thought they had found an incredible investment in the cryptocurrency world, yet were swindled out of everything. As part of these cryptocurrency… Read More


Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk!

Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk!
by Matthew Rosenquist on 01-16-2020 at 6:00 am

Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk

Cybersecurity will be hard pressed to take on the new challenges of bank managed digital currencies.

Banks are developing their own digital currencies. The introduction of Central Bank Digital Currencies (CBDC) is the beginning of an interesting trend that will change the cybersecurity dynamic for banking as it opens up an … Read More


Digital Retaliation of Iran – Top 6 Likely Cyber Attacks

Digital Retaliation of Iran – Top 6 Likely Cyber Attacks
by Matthew Rosenquist on 01-13-2020 at 10:00 am

Digital Retaliation of Iran – Top 6 Likely Cyberattacks

The United States and allies’ national cyber response may soon be tested with the latest escalating conflict in the middle east. The U.S. conducted an airstrike that killed a revered Iranian general while in Iraq. This was in retaliation to a number of attacks against U.S. personnel and most recently the U.S. embassy in… Read More


Tortuga Logic Scores Role in DoD Security Programs

Tortuga Logic Scores Role in DoD Security Programs
by Bernard Murphy on 01-07-2020 at 6:00 am

DoD logo

It should be no surprise in the current climate that the US government is ramping up investment in microelectronics security, particularly with an eye on China and investments they are making in the same area. This has two major thrusts as I read it: to ensure trusted and assured microelectronics are being used in US defense systems… Read More


Cryptocurrency Exchange Hacks are on the Rise

Cryptocurrency Exchange Hacks are on the Rise
by Matthew Rosenquist on 12-26-2019 at 10:00 am

Seven major cryptocurrency exchanges were victimized in 2019, totaling over $160 million in financial theft. As predicted, cybercriminal hackers targeted crypto exchanges in 2019 and the trend will continue into 2020.

Crypto exchanges are relatively new, as compared to those in the traditional financial markets. It is

Read More