hip webinar automating integration workflow 800x100 (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 285
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 285
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Software Security is Necessary but NOT Sufficient

Software Security is Necessary but NOT Sufficient
by Dr. Jason Oberg on 06-30-2016 at 12:00 pm

As the silicon designs inside the connected devices of the Internet of Things transition from specifications to tapeouts, electronics companies have come to the stark realization that software security is simply not adequate. Securing silicon is now a required, not optional, part of RTL design processes.… Read More


Whose IoT devices were breached in 2015?

Whose IoT devices were breached in 2015?
by Bill McCabe on 06-26-2016 at 4:00 pm

IoT, as we all know, is not without issues–though we have become reliant upon it in many ways.. In 2015, there were some very viable and tangible proofs that the IoT field is fraught with real peril and that we as IoT designers, developers and companies need to be paying more attention to security. Just how many different IoT … Read More


Why is the IoT Catnip to Hackers?

Why is the IoT Catnip to Hackers?
by Bill McCabe on 06-23-2016 at 4:00 pm

The latest developments in IoT security will protect the companies that use them from disastrous hacks.Rob Enderle writing in CIO Magazine May 20 about a new security certification for IOT products lauded the new offering and cited other measures that responsible IoT businesses must take to secure the future of their companies.… Read More


Synaptics’ New Security Adapter Takes PC Fingerprint Security Literally Anywhere

Synaptics’ New Security Adapter Takes PC Fingerprint Security Literally Anywhere
by Patrick Moorhead on 06-19-2016 at 4:00 pm

Synaptics is an understated innovator in the human interface and end user experience technology space, and many of the hottest smartphones, tablets and PCs have their technology inside. The Samsung Galaxy S7, Apple iPhone 6S, Dell XPS 15, Microsoft Surface and Surface Book, and HP ENVY are just a few of these products I’ve personally… Read More


The CyberSecurity Emperor Has No Clothes

The CyberSecurity Emperor Has No Clothes
by Bill Montgomery on 06-11-2016 at 7:00 am

In the past year, I’ve written numerous articles that have a common theme: the security world is badly broken as crypto schemas developed in the 90’s are no defense for today’s sophisticated hackers. For the most part, my blogs have been very well received, and have been picked up and posted by multiple sites and publications worldwide.… Read More


Moving chips from industrial to industrial IoT

Moving chips from industrial to industrial IoT
by Don Dingee on 05-27-2016 at 4:00 pm

IHS has put out its 1Q2016 Application Market Forecast predicting the highest growth rate segments for semiconductors over the next five years – and what was once old is new yet again. There it is, in the top right corner: industrial, projected to outpace even the automotive sector.… Read More


DAC 2016 – Register Now

DAC 2016 – Register Now
by Bernard Murphy on 05-16-2016 at 7:00 am

DAC is again going to be in Austin (reason enough to go), from June 6[SUP]th[/SUP]-8[SUP]th[/SUP] for the main event. A number of events caught my eye:

  • Monday AM – custom hardware for algorithmic trading. If you want to know more about FinTech (technology for finance) this could be for you
  • Another Monday morning session on Linux
Read More

We All Need To Get Serious About Protecting Company Data With Hardened, Multi-Factor Authentication

We All Need To Get Serious About Protecting Company Data With Hardened, Multi-Factor Authentication
by Patrick Moorhead on 05-11-2016 at 7:00 am

The world is becoming a less and less secure place due to the plethora of hacks that have happened over the course of the past few years. Companies like Sony, T-Mobile, Anthem, Target and their customers have been victims of countless cyber-attacks that resulted in many people’s information being compromised.

These breaches have… Read More


Deep Learning and Security

Deep Learning and Security
by Bernard Murphy on 05-10-2016 at 7:00 am

Deep learning based on neural nets is most commonly thought of as a very promising approach to scene recognition, text recognition and similar areas. Now there is increasing interest in applying this technology to security objectives. There were a number of papers on this topic in a 2015 BlackHat conference and there are several… Read More


Neural nets for Qualcomm Snapdragon

Neural nets for Qualcomm Snapdragon
by Bernard Murphy on 05-06-2016 at 12:00 pm

Neural nets are hot these days. In this forum certainly you can’t swing a cat without hitting multiple articles on the topic – I’ve written some myself. For me there are two reasons for this interest. First, neural nets are amazingly successful at what they do, for example in image recognition where they can beat… Read More