The semiconductor industry’s technological advances make it a prime target for espionage, facilitating protective measures and design strategies to protect intellectual property...
This article discusses the risks involved with OTA updates and the best practices, including the six crucial steps to guarantee OTA updates' dependability and safety for electronic...
Regulations for IoT continue to evolve in the U.S. and around the world, as governments worldwide implement security laws to protect consumer privacy in the expanding IoT landscape...
Electronic systems are under siege from cyberthreats, from phishing to sophisticated attacks on firewalls. This edition of Inside Electronics discusses cybersecure plans of action...
Memory safety problems, particularly when it comes to unsafe usage of pointers, are widespread and can cause significant security breaches. and consequent economic damage. CHERI...
QuProtect leverages quantum-safe cryptography for secure communications wherever data travels, with complete cryptographic control for adaptive protection against classical and...
In this first part of a three-part series, we talk to Skip Sanzeri, Co-Founder, Board Chair, and COO of QuSecure, about how cybersecurity is becoming more and more important in...
As software risk impacts organizations’ bottom lines, the prevalence of developers using open-source software in their projects poses software supply-chain challenges. This article...
Solutions are in demand to address the need to access isolated pockets of information as well as securely back up data off-site in case disaster strikes.
With the increasing number of cyberattacks and threats, securing data at rest (DAR) remains a top priority for virtually any organization, especially government and critical infrastruct...
The MAXQ1065 ultra-low-power cryptographic controller with ChipDNA for embedded devices offers cryptographic functions for root of trust, authentication, secure boot and firmware...
IoT device security a feature no more? Recently enacted and upcoming cybersecurity regulations and standards will significantly impact how these devices are designed.
Quantum computers make intractable math problems look like first graders’ math exams. This means trouble for cryptographic practitioners as our current algorithms are essentially...
As automotive SoCs become more complex, it can be challenging for automotive hardware suppliers to address the safety and security aspects independently. Still, engineers must...
Virtual machines and containers are widely used in embedded systems to consolidate workloads and enable DevSecOps, but which type of virtualization is more secure and is there...
Sometimes, randomness is intentionally introduced for security reasons, and that’s accomplished by collecting entropy, which is a measure of unpredictability.
Quantum computers pose a significant threat to information security, and both the NCSC and the NSA agree that the best mitigation against it is post-quantum cryptography.
Cybersecurity awareness is at an all-time high, reinforced by not only the threat environment from private entities, but also the current situation in Ukraine. We talk to Colin...
This article takes an in-depth look at a systematic framework for the analysis of cellular-network protocols, involving a 4G LTE example, to enhance security.
Don’t let the potentially cataclysmic quantum-computing onslaught catch you and your systems off-guard. Take these steps to upgrade to a quantum-safe PKI security infrastructure...
This article is part of the TechXchange: Cybersecurity As federal requirements for cybersecurity protection increase, so has the importance and need to demonstrate how OT is ...
Transport Layer Security is the most widely used approach for security on the internet—the majority of secure transactions depend on it. But myths about TLS still abound.
When it comes to protecting IoT devices from cyber attacks, each approach has supporters, but there are tradeoffs between “device-centric” and “appliance-centric.”
A paper describes a type of ransomware that could infect devices used to control power plants, water treatment facilities, and factory assembly lines, until a ransom is paid.
Encryption is critical to network computer communication, secure storage, and a host of other security aspects to computing, including the Internet of Things (IoT).
Originally integrated into the mainline Linux kernel over a decade ago, SELinux is a framework and set of tools used to harden Linux systems against potential threats.