Threat Detection: How To Keep the Crown Jewels Secure

Threat Detection: How To Keep the Crown Jewels Secure
by Paul McLellan on 09-02-2015 at 7:00 am

Let’s just take it as a given that securing IP design data is critical. It’s rather like saying that it’s a good idea to have security in the Tower of London to stop the crown jewels being stolen. IP blocks are the crown jewels of an SoC company.

Data now must be secured within the collaborative teams that share that… Read More