• Home >
  • Back Issues >
  • TechXchange >
  • Cybersecurity
  • Cybersecurity

    ID 123697425 © Alexandersikov | Dreamstime.com
    scalesofjustice_dreamstime_l_123697425
    March 12, 2025
    Given the complex relationship between geopolitical factors and cyberthreats in the semiconductor industry, what can companies do to protect the IP that’s the source of their ...
    Dreamstime_dotshock_329387847
    Cybersecurity for wireless electronics
    Nov. 22, 2024
    Sponsored by Texas Instruments: More sophisticated cyberthreats have prioritized security measures in wireless electronics design. Thanks to the latest standards, one of the best...
    Dreamstime_aerogondo_314841913
    dreamstime_aerogondo_314841913promo
    Oct. 22, 2024
    What practical steps can semiconductor manufacturers take to safeguard their operations in complex environments of specialized equipment and often-outdated OS?
    ID 159695842 © Aliia Chazova | Dreamstime.com
    schoolkid_dreamstime_l_159695842
    Oct. 10, 2024
    The FCC is taking an interest in keeping schools and libraries safe from digital threats with the backing of government funding.
    Agsandrew | Dreamstime.com
    Vm Promo Agsandrew Dreamstime Xxl 40383209
    Sept. 4, 2024
    Developers have a variety of ways to partition their system for modularity and security

    More content from Cybersecurity

    ID 139968771 © Suwin Puengsamrong | Dreamstime.com
    autonetworking_dreamstime_l_139968771
    Aug. 16, 2024
    As vehicles become more advanced, the need for increased security becomes a critical issue that MACsec looks to mitigate.
    Dreamstime_elen33_142387355
    July 12, 2024
    The semiconductor industry’s technological advances make it a prime target for espionage, facilitating protective measures and design strategies to protect intellectual property...
    137574951 © Sakkmesterke | Dreamstime.com
    June 25, 2024
    This article discusses the risks involved with OTA updates and the best practices, including the six crucial steps to guarantee OTA updates' dependability and safety for electronic...
    107745051 © Ekkasit919 | Dreamstime.com
    May 16, 2024
    Regulations for IoT continue to evolve in the U.S. and around the world, as governments worldwide implement security laws to protect consumer privacy in the expanding IoT landscape...
    Dreamstime_elnur_2083777352
    May 7, 2024
    Electronic systems are under siege from cyberthreats, from phishing to sophisticated attacks on firewalls. This edition of Inside Electronics discusses cybersecure plans of action...
    Codasip
    March 6, 2024
    Memory safety problems, particularly when it comes to unsafe usage of pointers, are widespread and can cause significant security breaches. and consequent economic damage. CHERI...
    Maxresdefault 653a5830b88c2
    Oct. 30, 2023
    QuProtect leverages quantum-safe cryptography for secure communications wherever data travels, with complete cryptographic control for adaptive protection against classical and...
    Maxresdefault 653a57ebb807a
    Oct. 27, 2023
    Quantum computers are in the process of significantly expanding computing power, which creates opportunities for improving cybersecurity.
    Maxresdefault 653a54c8673d7
    Oct. 26, 2023
    In this first part of a three-part series, we talk to Skip Sanzeri, Co-Founder, Board Chair, and COO of QuSecure, about how cybersecurity is becoming more and more important in...
    107262797 © Kasto80 | Dreamstime.com
    Software Dreamstime L 107262797
    Sept. 28, 2023
    As software risk impacts organizations’ bottom lines, the prevalence of developers using open-source software in their projects poses software supply-chain challenges. This article...
    Alexandersikov | dreamstime.com
    Alexandersikov Dreamstime Xxl 126587946 T X
    Sept. 21, 2023
    This series of webinars addresses the security aspects and recommendations for IoT device design.
    Maxresdefault 64d0ee7c06825
    Aug. 7, 2023
    At the core of every secure product is robust hardware security, which must also address the threats created by hardware vulnerabilities.
    DIGISTOR
    Promo Air Gapped
    July 20, 2023
    Solutions are in demand to address the need to access isolated pockets of information as well as securely back up data off-site in case disaster strikes.
    133915427 © Zerbor | Dreamstime.com
    Certification Dreamstime M 133915427
    May 23, 2023
    With the increasing number of cyberattacks and threats, securing data at rest (DAR) remains a top priority for virtually any organization, especially government and critical infrastruct...
    Photo 246972011 © Stevanovicigor | Dreamstime.com
    Cyberthreat Dreamstime L 246972011
    May 19, 2023
    AI and ML research and technology provider Quantum Ventura will use BrainChip’s Akida technology to develop cyber threat-detection tools.
    Dreamstime_Andrey-Cherkasov_77155550
    Dreamstime Andrey Cherkasov 77155550
    May 11, 2023
    The ability to import, export, transport, and share information is extremely important, even for air-gapped networks.
    Dreamstime_Technology-©-LagartoFilm_103749546
    Security Dreamstime Technology © Lagarto Film 103749546
    May 4, 2023
    This article delves into the regulations and best practices for IoT device cybersecurity by design.
    Ew Adi3 1
    April 19, 2023
    The MAXQ1065 ultra-low-power cryptographic controller with ChipDNA for embedded devices offers cryptographic functions for root of trust, authentication, secure boot and firmware...
    DIGISTOR
    Air Gapped Networks
    April 11, 2023
    It’s not enough to have an air-gapped network—that network must be located in a secure facility, too.
    eInfochips
    Promo Fpga Security Vulnerabilities And Countermeasures
    March 10, 2023
    This article explores the numerous risks associated with FPGA security and the recommended methods to keep the device secure.
    Photo 172532163 © Jon Anders Wiken | Dreamstime.com
    Dreamstime Promo 172532163
    Feb. 17, 2023
    IoT device security a feature no more? Recently enacted and upcoming cybersecurity regulations and standards will significantly impact how these devices are designed.
    118502277 © Awargula | Dreamstime.com
    Cybersecurity Dreamstime Xl 118502277
    Feb. 15, 2023
    Before looking ahead to what 2023 has in store, let’s take a breath and think about what aspects from 2022 will impact the discussion.
    193067636 © BiancoBlue | Dreamstime.com
    Av Dreamstime M 193067636 Promo
    Jan. 27, 2023
    The automotive industry is putting forth measures to harden cybersecurity defenses against malicious hackers.
    140704337 / Business © ProductionPerig | Dreamstime.com
    Quantum Dreamstime M 140704337
    Dec. 6, 2022
    Quantum computers make intractable math problems look like first graders’ math exams. This means trouble for cryptographic practitioners as our current algorithms are essentially...
    126273940 © Ekkasit919 | Dreamstime.com
    Dreamstime M 126273940 Promo
    Oct. 27, 2022
    As automotive SoCs become more complex, it can be challenging for automotive hardware suppliers to address the safety and security aspects independently. Still, engineers must...
    Dreamstime_Funtap-P_131525868
    Security Dreamstime Funtap P 131525868
    Oct. 20, 2022
    Virtual machines and containers are widely used in embedded systems to consolidate workloads and enable DevSecOps, but which type of virtualization is more secure and is there...
    Promo
    Oct. 19, 2022
    Rambus's Security Technologies Fellow explains how new encryption standards will address the problem of quantum-computing attacks.
    88379421 © ibreakstock | Dreamstime.com
    Nccc Dreamstime M 88379421 Promo
    Oct. 13, 2022
    Sometimes, randomness is intentionally introduced for security reasons, and that’s accomplished by collecting entropy, which is a measure of unpredictability.
    pexels-tima-miroshnichenko-5380642
    Pexels Tima Miroshnichenko 5380642 Promo
    Oct. 7, 2022
    A critical infrastructure leader shares industry insights on how to detect and prevent cyber threats.
    Capture
    July 14, 2022
    Quantum computers pose a significant threat to information security, and both the NCSC and the NSA agree that the best mitigation against it is post-quantum cryptography.
    Slide 7
    July 7, 2022
    NXP helps standardize the next-generation of public-key security in a post-quantum cryptography world.
    Image credit: Microchip Technology
    Microchip Secure Mcu Promo
    June 28, 2022
    Microchip said the combination is a step up from what its rivals are offering in the security department.
    Capture
    June 28, 2022
    With the expansion of AI into the cloud, there's an increasing need for robust security features and functions to protect AI models at the edge.
    Synopsys Ossra Promo
    April 19, 2022
    Synopsys’ Open Source Security and Risk Analysis report highlights the good and the bad.
    Promo
    March 28, 2022
    Secure Thingz's CEO, Haydn Povey, talks about the World Economic Forum’s Council on the Connected World announcement.
    Capture
    March 25, 2022
    Cybersecurity awareness is at an all-time high, reinforced by not only the threat environment from private entities, but also the current situation in Ukraine. We talk to Colin...
    70926704 © Michael Borgers | Dreamstime.com
    Cybersecurity Promo
    Feb. 5, 2022
    This article details the architecture of the cybersecurity conflict and offers recommendations for how to tilt the scales in favor of the good guys.
    Pravin Chakravarty, Dreamstime.com
    Cyber Security Pravin Chakravarty Dreamstime L 178802456
    Oct. 27, 2021
    This article takes an in-depth look at a systematic framework for the analysis of cellular-network protocols, involving a 4G LTE example, to enhance security.
    Whats The Difference 583806094
    July 27, 2021
    Ransomware and COVID-19, both of which continue to headline the news, share common terminology and ideas, but they’re very different.
    Kts | Dreamstime.com
    Digital Security Promo
    June 21, 2021
    Don’t let the potentially cataclysmic quantum-computing onslaught catch you and your systems off-guard. Take these steps to upgrade to a quantum-safe PKI security infrastructure...
    Vchalup | Dreamstime.com
    Ransomware Promo
    May 17, 2021
    The Colonial Pipeline is running again after the company paid a $5 million ransom.
    Hqdefault 609d39a7a688a
    May 13, 2021
    This article is part of the TechXchange: Cybersecurity As federal requirements for cybersecurity protection increase, so has the importance and need to demonstrate how OT is ...
    Crypto Handbook Promo 1001828198
    May 3, 2021
    This series, which is designed to be a quick study guide for product development engineers, takes an engineering rather than theoretical approach.
    Andrey Maslov, Dreamstime.com
    Space Andrey Maslov Dreamstime L 88598556
    April 22, 2021
    Quantum computers are fast becoming a reality—but as soon as they do, our trusted methods of encryption will immediately become inadequate.
    Maxresdefault 607642910471f
    April 14, 2021
    Morpheus uses machine learning to analyze and detect network attacks.
    Denisismagilov | Dreamstime.com
    Security Digital Promo
    March 12, 2021
    Lattice Semiconductor takes its Sentry security solution to the next level, with boot times improving by up to 400%.
    Getty Images
    Medical devices
    Nov. 13, 2019
    There’s lot to safeguard in healthcare’s computer networks, including patient safety and privacy.
    Don’t Do It: Disabling SELinux
    Dec. 19, 2018
    Implementing SELinux can definitely improve the security of a system—but only if you actually use it.
    11 Myths About TLS
    Nov. 8, 2018
    Transport Layer Security is the most widely used approach for security on the internet—the majority of secure transactions depend on it. But myths about TLS still abound.
    Secure Boot: What You Need to Know
    Jan. 29, 2018
    Data security is more important than ever with the avalanche of connected devices, and implementing Secure Boot is a crucial step in making it happen.
    WTD IoT Security-543485754web
    Aug. 3, 2017
    When it comes to protecting IoT devices from cyber attacks, each approach has supporters, but there are tradeoffs between “device-centric” and “appliance-centric.”
    Firewall Appliance Fig. 1
    June 13, 2017
    Could external firewalls help prevent the spread of viruses and ransomware in legacy systems?
    Ransomware
    May 15, 2017
    The number of systems being attacked using ransomware is on the rise. But is there a difference between ransomware and malware?
    Raheem Beyah left associate chair in the Georgia Tech School of Electrical and Computer Engineering and David Formby a Georgia Tech PhD student created a model of a water treatment plant to highlight the potential of ransomware attacks on programmable logic controllers Image courtesy of Georgia Tech
    Feb. 16, 2017
    A paper describes a type of ransomware that could infect devices used to control power plants, water treatment facilities, and factory assembly lines, until a ransom is paid.
    ee-crypto-fig-1-public-keypromo.jpg
    Dec. 2, 2016
    Encryption is critical to network computer communication, secure storage, and a host of other security aspects to computing, including the Internet of Things (IoT).
    EFF Photos | Flickr
    Image
    Feb. 22, 2016
    Technology editor Bill Wong talks about ransomware, backdoors, security, and privacy issues.
    Image
    April 22, 2015
    Systematic penetration of air-gapped systems, encryption cracking, and firmware reprogramming: Now is the time to invest in security.
    Image
    March 25, 2015
    Originally integrated into the mainline Linux kernel over a decade ago, SELinux is a framework and set of tools used to harden Linux systems against potential threats.