Ceva webinar AI Arch SEMI 800X100 250625
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 313
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 313
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Securing Your IoT System using ARM

Securing Your IoT System using ARM
by Daniel Payne on 03-14-2017 at 12:00 pm

I’ll never forget reading about and experiencing the October 21, 2016 Distributed Denial of Service (DDoS) attacks which slowed and shut down a lot of the Internet. On that particular attack the target was to shut down the Domain Name System (DNS). Traffic for this massive DDoS attack came from IoT devices which were unsecured… Read More


The Real Lesson from the AWS Outage

The Real Lesson from the AWS Outage
by Matthew Rosenquist on 03-08-2017 at 7:00 am

The embarrassing outage of Amazon Web Services this week should open our eyes to a growing problem. Complex systems are difficult to manage, but if they are connected in dependent ways, a fragile result emerges. Such structures are subject to unexpected malfunctions which can sprawl quickly. One of the most knowledgeable technologyRead More


Automotive OEMs Get Boost as NetSpeed NoC is Certified ISO 26262 Ready

Automotive OEMs Get Boost as NetSpeed NoC is Certified ISO 26262 Ready
by Mitch Heins on 03-07-2017 at 12:00 pm


I read with great interest today news from NetSpeed Systems that both their Gemini and Orion NoC IPs have been certified ISO 26262 ASIL D ready. They were certified by SGS-TUV Saar GmbH, an independent accredited assessor. This is a big deal as up till now, it was left up to the OEMs to do most of the heavily lifting to qualify their IC’s… Read More


Adaptation or Crisis – Will Security Save Technology

Adaptation or Crisis – Will Security Save Technology
by Matthew Rosenquist on 02-18-2017 at 12:00 pm

The technology landscape is rapidly changing how we interact and live in our world. The variety of Internet of Things is huge and growing at a phenomenal pace. Every kind of device imaginable is becoming ‘smart’ and connected. Entertainment gadgets, industrial sensors, medical devices, household appliances, and personal assistantsRead More


Think your future historical encrypted data is secure? Think again…

Think your future historical encrypted data is secure? Think again…
by Bill Montgomery on 02-18-2017 at 7:00 am

It’s been 32 years since the successful sci-fi comedy, Back to the Future, saw 17-year old Marty McFly – played by Michael J. Fox – accidentally travel 30 years back in time to 1955. The film was a box-office smash, as audiences worldwide delighted in McFly’s antics, only to soon realize that the cool kid from the future was jeopardizing… Read More


Adversarial Machine Learning

Adversarial Machine Learning
by Bernard Murphy on 01-20-2017 at 7:00 am

It had to happen. We’ve read about hacking deep learning / machine learning, so now there is a discipline emerging around studying and defending against potential attacks. Of course, the nature of attacks isn’t the same; you can’t really write an algorithmic attack against a non-algorithmic analysis (or at least a non-standard… Read More


Missteps in Securing Autonomous Vehicles

Missteps in Securing Autonomous Vehicles
by Matthew Rosenquist on 01-19-2017 at 12:00 pm

Recently an autonomous car company highlighted some plans to keep their vehicles safe from hacking. Yet their plans won’t actually make them secure. Such gaffs highlight issues across many different industries where cybersecurity is not sufficiently understood by manufacturers to deliver products hardened against attack.… Read More


IoT and Blockchain Convergence

IoT and Blockchain Convergence
by Ahmed Banafa on 01-17-2017 at 12:00 pm

AAEAAQAAAAAAAAkGAAAAJDAyYzJjYjFhLWY3NGItNDNjOS05YmNkLWQ1YjUxODlhNTc1MQ

The Internet of Things (IoT) as a concept is fascinating and exciting, but one of the major challenging aspects of IoT is having a secure ecosystem encompassing all building blocks of IoT-architecture. Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies… Read More


Cyber Risks Compound with Technology Adoption

Cyber Risks Compound with Technology Adoption
by Matthew Rosenquist on 01-12-2017 at 7:00 am

AAEAAQAAAAAAAAj AAAAJDQwNjJmNmEzLTc4NmQtNDM2My1hZTJiLTVkYTg3YjU3ODVkMg

Just how reliant are we on computing infrastructure? Sometimes it takes just a little outage to get a taste of the interwoven dependency we don’t readily see.

It can be small. The international travelers landing in U.S. airports on January 3rd, one of the busiest travel days of the year, found themselves stuck in long lines due to … Read More


Biggest Cybercriminal Ad-Fraud Rakes in Millions per Day

Biggest Cybercriminal Ad-Fraud Rakes in Millions per Day
by Matthew Rosenquist on 12-30-2016 at 12:00 pm

AAEAAQAAAAAAAAc0AAAAJDkxMjIwYmFhLWE2Y2EtNGViZi1hM2M4LTljYTMxYmFjMmI3OA

Methbot is a state-of-the-art ad fraud infrastructure, capable of hosting legitimate videos and serving them to 300 million fake viewers a day. Each view earns the criminals about $13, translating to around four million dollars a day. Over the past few months, Methbot has pulled in an estimated $180 million. It represents one … Read More