Hyperstone Webinar – There’s More to a Storage System Than Meets the Eye

Hyperstone Webinar – There’s More to a Storage System Than Meets the Eye
by Mike Gianfagna on 09-19-2023 at 10:00 am

Hyperstone Webinar There's More to a Storage System Than Meets the Eye

Founded in 1990, Hyperstone is a fabless NAND flash memory controller company enabling safe, reliable and secure storage systems. The company designs, develops and delivers high-quality, innovative semiconductor solutions to enable its customers to produce world-class products for industrial, embedded, automotive and… Read More


Crypto modernization timeline starting to take shape

Crypto modernization timeline starting to take shape
by Don Dingee on 06-15-2023 at 10:00 am

CNSA Suite 2.0 crypto modernization timeline

Post-quantum cryptography (PQC) might be a lower priority for many organizations, with the specter of quantum-based cracking seemingly far off. Government agencies are fully sensitized to the cracking risks and the investments needed to mitigate them and are busy laying 10-year plans for migration to quantum-safe encryption.… Read More


Webinar: ISO26262 and ISO21434 in Polarion ALM – Functional Safety, Cyber Security

Webinar: ISO26262 and ISO21434 in Polarion ALM – Functional Safety, Cyber Security
by Admin on 05-31-2023 at 2:31 pm

About

Automotive industry requires compiance with ISO26262 – Functional Safety and ISO21434 CyberSecurity. OEM and suppliers are looking for solution. Polarion ALM has special project templates with workflows, data model, reports, integrations, etc.

One solution to address:

– Requirements Management,
Read More


Automotive Cyber-Security: Off-Board and On-Board: Standards & Technologies

Automotive Cyber-Security: Off-Board and On-Board: Standards & Technologies
by Admin on 05-18-2022 at 4:24 pm

Tuesday, May 24, 2022

  • 10:30 AM (CET)
  • 5:30 PM (CET) / 11:30 AM (EST)

Webinar Abstract

Safety and Security are two important non-functional requirements in the field of embedded systems for automotives. The need for safety addresses any and all physical harm that could affect the driver and the passengers, whilst Security addresses

Read More

The 10 Worst Cybersecurity Strategies

The 10 Worst Cybersecurity Strategies
by Matthew Rosenquist on 07-26-2020 at 8:00 am

The 10 Worst Cybersecurity Strategies

Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…

Let’s count them down.

10. Cyber-Insurance

No need for security, … Read More


Intel Designs Chips to Protect from ROP Attacks

Intel Designs Chips to Protect from ROP Attacks
by Matthew Rosenquist on 06-28-2020 at 10:00 am

Intel Designs Chips to Protect from ROP Attacks

Intel comes late to the game but will be delivering an embedded defense for Return Oriented Programming (ROP) types of cyber hacks. I first blogged about this back in Sept of 2016. Yes, almost four years have passed and I had hoped it would see the light of day much earlier.

The feature, to debut in the Tiger Lake microarchitecture… Read More


8 Key Tech Trends in a Post-COVID-19 World

8 Key Tech Trends in a Post-COVID-19 World
by Ahmed Banafa on 06-05-2020 at 10:00 am

8 Key Tech Trends in a Post COVID World

COVID-19 has demonstrated the importance of digital readiness, which allows business and people’s life to continue as usual during pandemics. Building the necessary infrastructure to support a digitized world and stay current in the latest technology will be essential for any business or country to remain competitive in a … Read More


Security in I/O Interconnects

Security in I/O Interconnects
by Mike Gianfagna on 03-25-2020 at 10:00 am

shutterstock 1221815029

I got a chance to chat with Richard Solomon at Synopsys recently about a very real threat for all of us and what Synopsys is doing about it. No, the topic isn’t the Coronavirus, it’s one that has been around a lot longer and will continue to be a very real threat – data and interconnect security.

First, a bit about Richard. He is the technical… Read More


Will a Lack of Ethics Doom Artificial Intelligence

Will a Lack of Ethics Doom Artificial Intelligence
by Matthew Rosenquist on 05-31-2019 at 5:00 am

If there was ever a time that ethics should be formally applied to technology, it is with the emergence of Artificial Intelligence. Yet most of the big AI companies struggle with what should seem a simple task: defining ethics for the use of their products. Without the underpinnings of a moral backbone, powerful tools often become… Read More


Auto Cyber Security: From Ignorance to Compliance

Auto Cyber Security: From Ignorance to Compliance
by Roger C. Lanctot on 12-02-2018 at 7:00 am

Auto makers have long relied on security by obscurity to get away with not defining or adhering to proper cyber security hygiene. This rationalization had been embraced in the context of low levels of automotive hacking mainly carried out by enthusiasts or so-called “white hat” or ethical hackers.

A new report from Strategy Analytics,… Read More