hip webinar automating integration workflow 800x100 (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 285
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 285
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Crypto modernization timeline starting to take shape

Crypto modernization timeline starting to take shape
by Don Dingee on 06-15-2023 at 10:00 am

CNSA Suite 2.0 crypto modernization timeline

Post-quantum cryptography (PQC) might be a lower priority for many organizations, with the specter of quantum-based cracking seemingly far off. Government agencies are fully sensitized to the cracking risks and the investments needed to mitigate them and are busy laying 10-year plans for migration to quantum-safe encryption.… Read More


Arm 2023 Mobile Solutions Continue Gaming Focus

Arm 2023 Mobile Solutions Continue Gaming Focus
by Bernard Murphy on 06-06-2023 at 6:00 am

TCS23

Arm recently announced an update for mobile under the Arm Total Compute Solutions (TCS) label, led by Chris Bergey (Sr. VP/GM for the Client line of business). You’ll remember that Chris headed the infrastructure line of business impressively through the Neoverse brand, as demonstrated by Arm-based servers appearing in multiple… Read More


Accellera Update at DVCon 2023

Accellera Update at DVCon 2023
by Bernard Murphy on 03-16-2023 at 6:00 am

logo accellera min

I have a new-found respect for Lu Dai. He is a senior director of engineering at Qualcomm, with valuable insight into the ground realities of verification in a big semiconductor company. He is on the board of directors at RISC-V International and is chairman of the board of directors at Accellera, both giving him a top-down view of… Read More


IoT in Distress at MWC 2023

IoT in Distress at MWC 2023
by Roger C. Lanctot on 03-01-2023 at 10:00 am

MWC 2023 IoT in Distress

The talk of the table – or at least my end of the table – at the annual Cybersecurity Dinner – hosted by Copper Horse Ltd. – was the dismal state of IoT. Millions of devices are being connected – but no one is making money.

Of course that isn’t absolutely accurate. There are organizations that are able to make money in IoT,… Read More


Hardware Security in Medical Devices has not been a Priority — But it Should Be

Hardware Security in Medical Devices has not been a Priority — But it Should Be
by Andreas Kuehlmann on 02-21-2023 at 6:00 am

iStock 136200269

Rapid advances in medical technology prolong patients’ lives and provide them with a higher standard of living than years past. But the increased interconnectivity of those devices and their dependence on wired and wireless networks leave them susceptible to cyberattacks that could have severe consequences.

Whether… Read More


ASIL B Certification on an Industry-Class Root of Trust IP

ASIL B Certification on an Industry-Class Root of Trust IP
by Bernard Murphy on 02-08-2023 at 6:00 am

ASIL B requirements

I have always been curious about how Austemper-based safety methodologies (from Siemens EDA) compares with conventional safety flows. Siemens EDA together with Rambus recently released a white paper on getting a root of trust IP to ASIL B certification. This provides a revealing insight beyond the basics of fault simulation… Read More


Privacy? What Privacy?

Privacy? What Privacy?
by Roger C. Lanctot on 02-06-2023 at 10:00 am

Automotive Privacy and Security

It seems as if every day brings news of yet another company that is using artificial intelligence to leverage smartphone data for “non-invasive” analytics of human movement. Our smartphones and smartwatches and fitbits can detect whatever activity we are doing, how well or poorly we are doing it, how it is affecting our mood, … Read More


Validating NoC Security. Innovation in Verification

Validating NoC Security. Innovation in Verification
by Bernard Murphy on 12-21-2022 at 6:00 am

Innovation New

Network on Chip (NoC) connectivity is ubiquitous in SoCs, therefore should be an attractive attack vector. Is it possible to prove robustness against a broad and configurable range of threats? Paul Cunningham (Senior VP/GM, Verification at Cadence), Raúl Camposano (Silicon Catalyst, entrepreneur, former Synopsys CTO and… Read More


Blockchain 4.0

Blockchain 4.0
by Ahmed Banafa on 11-10-2022 at 10:00 am

Blockchain 4.0

The simple and best definition of Blockchain technology is to think about it as electricity , you only see it’s applications but you understand how important it’s and know there are many applications and products that can run on it . But like any other technology it went through stages and evolved as it progressed and matured. We started… Read More