• Home >
  • Back Issues >
  • TechXchange >
  • Cybersecurity
  • Cybersecurity

    Dreamstime_aerogondo_314841913
    dreamstime_aerogondo_314841913promo
    Industrial

    Protecting Legacy OS in Semiconductor Fab Operations

    Oct. 22, 2024
    What practical steps can semiconductor manufacturers take to safeguard their operations in complex environments of specialized equipment and often-outdated OS?
    ID 159695842 © Aliia Chazova | Dreamstime.com
    schoolkid_dreamstime_l_159695842
    Security

    FCC Looks at Upgrading School Cybersecurity to Protect Against Hackers

    Oct. 10, 2024
    The FCC is taking an interest in keeping schools and libraries safe from digital threats with the backing of government funding.
    Agsandrew | Dreamstime.com
    Vm Promo Agsandrew Dreamstime Xxl 40383209
    TechXchange

    VMs, Unikernels, and Containers

    Sept. 4, 2024
    Developers have a variety of ways to partition their system for modularity and security
    ID 139968771 © Suwin Puengsamrong | Dreamstime.com
    autonetworking_dreamstime_l_139968771
    Ethernet

    Going Beyond Ethernet: Securing Automotive Networks with MACsec

    Aug. 16, 2024
    As vehicles become more advanced, the need for increased security becomes a critical issue that MACsec looks to mitigate.
    Dreamstime_elen33_142387355
    Security

    Designing Defenses: How to Thwart Semiconductor Espionage

    July 12, 2024
    The semiconductor industry’s technological advances make it a prime target for espionage, facilitating protective measures and design strategies to protect intellectual property...

    More content from Cybersecurity

    137574951 © Sakkmesterke | Dreamstime.com
    Embedded

    Beyond the Download: Resetting the Vulnerabilities of OTA Updates

    June 25, 2024
    This article discusses the risks involved with OTA updates and the best practices, including the six crucial steps to guarantee OTA updates' dependability and safety for electronic...
    107745051 © Ekkasit919 | Dreamstime.com
    IoT

    IoT Laws Aim to Protect User Information and Mitigate Cybersecurity Threats

    May 16, 2024
    Regulations for IoT continue to evolve in the U.S. and around the world, as governments worldwide implement security laws to protect consumer privacy in the expanding IoT landscape...
    Dreamstime_elnur_2083777352
    Inside Electronics

    Tackling Cybersecurity Issues in Embedded Systems

    May 7, 2024
    Electronic systems are under siege from cyberthreats, from phishing to sophisticated attacks on firewalls. This edition of Inside Electronics discusses cybersecure plans of action...
    Codasip
    Embedded

    What’s the Difference Between Conventional Memory Protection and CHERI?

    March 6, 2024
    Memory safety problems, particularly when it comes to unsafe usage of pointers, are widespread and can cause significant security breaches. and consequent economic damage. CHERI...
    Maxresdefault 653a5830b88c2
    Security

    Why Quantum Cybersecurity is Imperative

    Oct. 30, 2023
    QuProtect leverages quantum-safe cryptography for secure communications wherever data travels, with complete cryptographic control for adaptive protection against classical and...
    Maxresdefault 653a57ebb807a
    Quantum Computing

    What’s So Special About Quantum Computing?

    Oct. 27, 2023
    Quantum computers are in the process of significantly expanding computing power, which creates opportunities for improving cybersecurity.
    Maxresdefault 653a54c8673d7
    Security

    Cybersecurity from the Developer’s Seat

    Oct. 26, 2023
    In this first part of a three-part series, we talk to Skip Sanzeri, Co-Founder, Board Chair, and COO of QuSecure, about how cybersecurity is becoming more and more important in...
    107262797 © Kasto80 | Dreamstime.com
    Software Dreamstime L 107262797
    Software

    Securing Your Software Supply Chain: Recognize the Risks and Solutions

    Sept. 28, 2023
    As software risk impacts organizations’ bottom lines, the prevalence of developers using open-source software in their projects poses software supply-chain challenges. This article...
    Alexandersikov | dreamstime.com
    Alexandersikov Dreamstime Xxl 126587946 T X
    Security

    Device Security by Design Series - Available On Demand

    Sept. 21, 2023
    This series of webinars addresses the security aspects and recommendations for IoT device design.
    Maxresdefault 64d0ee7c06825
    Test & Measurement

    Security Verification for Embedded Hardware Designs

    Aug. 7, 2023
    At the core of every secure product is robust hardware security, which must also address the threats created by hardware vulnerabilities.
    DIGISTOR
    Promo Air Gapped
    Industrial

    Air-Gapped Networks (Part 3): Cross-Domain Solutions and Off-Site Backups

    July 20, 2023
    Solutions are in demand to address the need to access isolated pockets of information as well as securely back up data off-site in case disaster strikes.
    133915427 © Zerbor | Dreamstime.com
    Certification Dreamstime M 133915427
    Embedded

    The Value of Common Criteria Certification for Securing Information

    May 23, 2023
    With the increasing number of cyberattacks and threats, securing data at rest (DAR) remains a top priority for virtually any organization, especially government and critical infrastruct...
    Photo 246972011 © Stevanovicigor | Dreamstime.com
    Cyberthreat Dreamstime L 246972011
    Machine Learning

    Building Cyber Threat-Detection Tools with Neuromorphic Computing

    May 19, 2023
    AI and ML research and technology provider Quantum Ventura will use BrainChip’s Akida technology to develop cyber threat-detection tools.
    Dreamstime_Andrey-Cherkasov_77155550
    Dreamstime Andrey Cherkasov 77155550
    Industrial

    Air-Gapped Networks (Part 2): Moving Information

    May 11, 2023
    The ability to import, export, transport, and share information is extremely important, even for air-gapped networks.
    Dreamstime_Technology-©-LagartoFilm_103749546
    Security Dreamstime Technology © Lagarto Film 103749546
    IoT

    Preventing and Detecting Cyberattacks on Connected Devices

    May 4, 2023
    This article delves into the regulations and best practices for IoT device cybersecurity by design.
    Ew Adi3 1
    Security

    ICs Protect System Infrastructure from Rogue Data

    April 19, 2023
    The MAXQ1065 ultra-low-power cryptographic controller with ChipDNA for embedded devices offers cryptographic functions for root of trust, authentication, secure boot and firmware...
    DIGISTOR
    Air Gapped Networks
    Embedded

    Air-Gapped Networks (Part 1): Air-Gapped Madness

    April 11, 2023
    It’s not enough to have an air-gapped network—that network must be located in a secure facility, too.
    eInfochips
    Promo Fpga Security Vulnerabilities And Countermeasures
    Industrial

    FPGA Security Vulnerabilities and Countermeasures

    March 10, 2023
    This article explores the numerous risks associated with FPGA security and the recommended methods to keep the device secure.
    Photo 172532163 © Jon Anders Wiken | Dreamstime.com
    Dreamstime Promo 172532163
    Embedded

    IoT Device Security: Regulatory and Standards Activity Drive 2023 Device Design

    Feb. 17, 2023
    IoT device security a feature no more? Recently enacted and upcoming cybersecurity regulations and standards will significantly impact how these devices are designed.
    118502277 © Awargula | Dreamstime.com
    Cybersecurity Dreamstime Xl 118502277
    Embedded

    The Security and Storage Outlook for 2023

    Feb. 15, 2023
    Before looking ahead to what 2023 has in store, let’s take a breath and think about what aspects from 2022 will impact the discussion.
    193067636 © BiancoBlue | Dreamstime.com
    Av Dreamstime M 193067636 Promo
    Automotive

    Taking Action to Further Protect Automotive ECUs

    Jan. 27, 2023
    The automotive industry is putting forth measures to harden cybersecurity defenses against malicious hackers.
    140704337 / Business © ProductionPerig | Dreamstime.com
    Quantum Dreamstime M 140704337
    Embedded

    Preparing Cryptography for the Risks of a Post-Quantum Computing World

    Dec. 6, 2022
    Quantum computers make intractable math problems look like first graders’ math exams. This means trouble for cryptographic practitioners as our current algorithms are essentially...
    126273940 © Ekkasit919 | Dreamstime.com
    Dreamstime M 126273940 Promo
    Automotive

    Automotive Safety and Security on the Road

    Oct. 27, 2022
    As automotive SoCs become more complex, it can be challenging for automotive hardware suppliers to address the safety and security aspects independently. Still, engineers must...
    Dreamstime_Funtap-P_131525868
    Security Dreamstime Funtap P 131525868
    Embedded

    What’s the Difference in Security Between Virtual Machines and Containers?

    Oct. 20, 2022
    Virtual machines and containers are widely used in embedded systems to consolidate workloads and enable DevSecOps, but which type of virtualization is more secure and is there...
    Promo
    Embedded

    Quantum Computing and Crypto Standards

    Oct. 19, 2022
    Rambus's Security Technologies Fellow explains how new encryption standards will address the problem of quantum-computing attacks.
    88379421 © ibreakstock | Dreamstime.com
    Nccc Dreamstime M 88379421 Promo
    Embedded

    Entropy for Embedded Devices

    Oct. 13, 2022
    Sometimes, randomness is intentionally introduced for security reasons, and that’s accomplished by collecting entropy, which is a measure of unpredictability.
    pexels-tima-miroshnichenko-5380642
    Pexels Tima Miroshnichenko 5380642 Promo
    Automation

    Cyber Threat Detection: 5 Top Priorities for Critical Infrastructure Security Leaders

    Oct. 7, 2022
    A critical infrastructure leader shares industry insights on how to detect and prevent cyber threats.
    Capture
    Systems

    How to Keep Ahead of the Quantum-Computing Threat

    July 14, 2022
    Quantum computers pose a significant threat to information security, and both the NCSC and the NSA agree that the best mitigation against it is post-quantum cryptography.
    Slide 7
    Embedded

    Quantum Computing Forces New Public-Key Cryptography Standard

    July 7, 2022
    NXP helps standardize the next-generation of public-key security in a post-quantum cryptography world.
    Image credit: Microchip Technology
    Microchip Secure Mcu Promo
    Embedded

    Cortex-M23 MCU Unites Secure Subsystem with Arm TrustZone

    June 28, 2022
    Microchip said the combination is a step up from what its rivals are offering in the security department.
    Capture
    IoT

    Cybersecurity Suite Protects Edge AI Models

    June 28, 2022
    With the expansion of AI into the cloud, there's an increasing need for robust security features and functions to protect AI models at the edge.
    Synopsys Ossra Promo
    Embedded

    Open Source vs. Security and Risk: An Analysis Report

    April 19, 2022
    Synopsys’ Open Source Security and Risk Analysis report highlights the good and the bad.
    Promo
    Embedded

    Five Security "Must Haves" and the World Economic Forum

    March 28, 2022
    Secure Thingz's CEO, Haydn Povey, talks about the World Economic Forum’s Council on the Connected World announcement.
    Capture
    Mobile

    What the Ukrainian War Can Teach Us About Cybersecurity

    March 25, 2022
    Cybersecurity awareness is at an all-time high, reinforced by not only the threat environment from private entities, but also the current situation in Ukraine. We talk to Colin...
    70926704 © Michael Borgers | Dreamstime.com
    Cybersecurity Promo
    Automation

    Get Outta Here: Securing Computing Systems by Storing Security Elsewhere

    Feb. 5, 2022
    This article details the architecture of the cybersecurity conflict and offers recommendations for how to tilt the scales in favor of the good guys.
    Pravin Chakravarty, Dreamstime.com
    Cyber Security Pravin Chakravarty Dreamstime L 178802456
    Communications

    Identifying Vulnerabilities in Cellular Networks

    Oct. 27, 2021
    This article takes an in-depth look at a systematic framework for the analysis of cellular-network protocols, involving a 4G LTE example, to enhance security.
    Whats The Difference 583806094
    alt.embedded

    What’s the Difference Between Ransomware and COVID-19?

    July 27, 2021
    Ransomware and COVID-19, both of which continue to headline the news, share common terminology and ideas, but they’re very different.
    Kts | Dreamstime.com
    Digital Security Promo
    Automation

    How to Protect Your Digital Systems from the Quantum Apocalypse

    June 21, 2021
    Don’t let the potentially cataclysmic quantum-computing onslaught catch you and your systems off-guard. Take these steps to upgrade to a quantum-safe PKI security infrastructure...
    Vchalup | Dreamstime.com
    Ransomware Promo
    alt.embedded

    Is Your Ransomware Mistake Worth $5 Million?

    May 17, 2021
    The Colonial Pipeline is running again after the company paid a $5 million ransom.
    Hqdefault 609d39a7a688a
    Embedded

    Cybersecurity in the Operational Technology World

    May 13, 2021
    This article is part of the TechXchange: Cybersecurity As federal requirements for cybersecurity protection increase, so has the importance and need to demonstrate how OT is ...
    Crypto Handbook Promo 1001828198
    Embedded

    The Cryptography Handbook

    May 3, 2021
    This series, which is designed to be a quick study guide for product development engineers, takes an engineering rather than theoretical approach.
    Andrey Maslov, Dreamstime.com
    Space Andrey Maslov Dreamstime L 88598556
    Embedded

    Are We Doomed to Repeat History? The Looming Quantum Computer Event Horizon

    April 22, 2021
    Quantum computers are fast becoming a reality—but as soon as they do, our trusted methods of encryption will immediately become inadequate.
    Maxresdefault 607642910471f
    Video

    Detect Cybersecurity Threats Instantly with NVIDIA Morpheus

    April 14, 2021
    Morpheus uses machine learning to analyze and detect network attacks.
    Denisismagilov | Dreamstime.com
    Security Digital Promo
    Automation

    Pre-Boot Security Gets More Secure

    March 12, 2021
    Lattice Semiconductor takes its Sentry security solution to the next level, with boot times improving by up to 400%.
    Getty Images
    Medical devices
    Medical

    Protecting Healthcare from Cyberattacks

    Nov. 13, 2019
    There’s lot to safeguard in healthcare’s computer networks, including patient safety and privacy.
    Don’t Do It: Disabling SELinux
    Embedded

    Don’t Do It: Disabling SELinux

    Dec. 19, 2018
    Implementing SELinux can definitely improve the security of a system—but only if you actually use it.
    11 Myths About TLS
    Embedded

    11 Myths About TLS

    Nov. 8, 2018
    Transport Layer Security is the most widely used approach for security on the internet—the majority of secure transactions depend on it. But myths about TLS still abound.
    Secure Boot: What You Need to Know
    Embedded

    Secure Boot: What You Need to Know

    Jan. 29, 2018
    Data security is more important than ever with the avalanche of connected devices, and implementing Secure Boot is a crucial step in making it happen.
    WTD IoT Security-543485754web
    Automation

    What’s the Difference Between Device Hardening and Security Appliances?

    Aug. 3, 2017
    When it comes to protecting IoT devices from cyber attacks, each approach has supporters, but there are tradeoffs between “device-centric” and “appliance-centric.”
    Firewall Appliance Fig. 1
    Automation

    The Advantages of External Firewalls

    June 13, 2017
    Could external firewalls help prevent the spread of viruses and ransomware in legacy systems?
    Ransomware
    Automation

    What’s the Difference Between Ransomware and Malware?

    May 15, 2017
    The number of systems being attacked using ransomware is on the rise. But is there a difference between ransomware and malware?
    Raheem Beyah left associate chair in the Georgia Tech School of Electrical and Computer Engineering and David Formby a Georgia Tech PhD student created a model of a water treatment plant to highlight the potential of ransomware attacks on programmable logic controllers Image courtesy of Georgia Tech
    IoT

    A Malware Experiment Foreshadows Factories Held for Ransom

    Feb. 16, 2017
    A paper describes a type of ransomware that could infect devices used to control power plants, water treatment facilities, and factory assembly lines, until a ransom is paid.
    ee-crypto-fig-1-public-keypromo.jpg
    Embedded

    Crypto Essentials

    Dec. 2, 2016
    Encryption is critical to network computer communication, secure storage, and a host of other security aspects to computing, including the Internet of Things (IoT).
    EFF Photos | Flickr
    Image
    IoT

    Ransomware, Backdoors, and Privacy

    Feb. 22, 2016
    Technology editor Bill Wong talks about ransomware, backdoors, security, and privacy issues.
    Image
    Embedded

    What is Really Happening in the World of Cybersecurity?

    April 22, 2015
    Systematic penetration of air-gapped systems, encryption cracking, and firmware reprogramming: Now is the time to invest in security.
    Image
    Embedded

    SELinux 101: What You Should Know

    March 25, 2015
    Originally integrated into the mainline Linux kernel over a decade ago, SELinux is a framework and set of tools used to harden Linux systems against potential threats.