Ceva webinar AI Arch SEMI 800X100 250625
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 313
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 313
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Artificial Intelligence for Cyber Security

Artificial Intelligence for Cyber Security
by Alex G. Lee on 10-17-2016 at 12:00 pm

Since the United States is such a large market for products and services from nearly all technology innovations, a patent counting for growth in patenting over a period of times in the US can be a good measuring tool for monitoring the evolution of technology innovations. Following figure shows the growth trends for the artificial… Read More


What Will Kill ROP Cyberattacks?

What Will Kill ROP Cyberattacks?
by Matthew Rosenquist on 09-28-2016 at 10:00 am

IBM recently announced a software-oriented solution to help eradicate Return Oriented Programming (ROP) malware attacks. ROP is a significant and growing problem in the industry. Crafty hackers will use snippets of code from other trusted programs and stitch it together to create their attacks. It has become a very popular… Read More


The Privacy Delusion

The Privacy Delusion
by Roger C. Lanctot on 09-28-2016 at 7:00 am

Why do we think we have privacy in our cars? Why does the government believe there is an interest in preserving privacy in cars? Can we just get over it? One of the least private places known to mankind – outside of the Internet – is the car!

But our transportation regulators in the U.S. and their counterparts at the European Commission… Read More


CEO Interview: Xerxes Wania of Sidense

CEO Interview: Xerxes Wania of Sidense
by Daniel Nenni on 09-19-2016 at 7:00 am

This is the first in a series of CEO interviews and I thought semiconductor IP would be a great place to start. Xerxes Wania is the President and CEO of Sidense, a leading developer of Non-Volatile Memory (NVM) One-Time Programmable (OTP) IP cores. Sidense has been a part of SemiWiki since 2013 so we know them quite well. I hope the rest… Read More


IOT Security – Ongoing Challenge

IOT Security – Ongoing Challenge
by Bill McCabe on 09-14-2016 at 12:00 pm

It is near impossible to read or have a conversation about IoT, without security becoming a major topic. For IT professionals involved with IoT projects, security needs to be a major consideration, starting with planning and design, and continuing all the way through to deployment, implementation, and maintenance. Security… Read More


A Powerful Case for the ARC SEM Processor

A Powerful Case for the ARC SEM Processor
by Bernard Murphy on 09-12-2016 at 8:06 am

Building devices for the IoT has become especially challenging thanks to two conflicting requirements. The device has to be small and ultra-low power in most applications but also in many of those applications it has to provide a high-level of security, especially to defend high-value targets like smart metering, payment terminals,… Read More


Using Blockchain to Secure IoT

Using Blockchain to Secure IoT
by Ahmed Banafa on 09-08-2016 at 7:00 am

IoT is creating new opportunities and providing a competitive advantage for businesses in current and new markets. It touches everything—not just the data, but how, when, where and why you collect it. The technologies that have created the Internet of Things aren’t changing the internet only, but rather change the things connected… Read More


We Have Met the Enemy (of Security) and It Is Us

We Have Met the Enemy (of Security) and It Is Us
by Bernard Murphy on 09-05-2016 at 7:00 am

(With apologies to Pogo.) For all the great work that we are seeing in improving both software and hardware security, we – not the technology – are in many ways the weakest link in the security chain. Recent reports indicate we are surprisingly easy to fool, despite our much proclaimed awareness of risks.

In a recent experiment at … Read More


Semi execs look at IoT tradeoffs a bit differently

Semi execs look at IoT tradeoffs a bit differently
by Don Dingee on 08-15-2016 at 4:00 pm

What happens when you get a panel of four executives together with an industry-leading journalist to discuss tradeoffs in IoT designs? After the obligatory introductions, Ed Sperling took this group into questions on power, performance, and integration.… Read More


Lethal data injection a much bigger threat

Lethal data injection a much bigger threat
by Don Dingee on 08-08-2016 at 4:00 pm

Watching a spirited debate on Twitter this morning between Tom Peters and some of his followers reminded me of the plot of many spy movies: silently killing an opponent with a lethal injection of some exotic, undetectable poison. We are building in enormous risks in more and more big data systems.… Read More