Some of the top Rambus technical experts will hold forth at DesignCon 2019 in a full-day sponsored training session on
The latest news coming out of the security world is the link up of Micron’s Authenta™ secure memory product and
We will be showcasing our CryptoManager Root of Trust at the RISC-V Summit on December 3-6,2018, at the Santa Clara Convention Center..
With the proliferation of connected devices and the sensitive data they produce comes a significant challenge for manufacturers seeking to
On November 27th, Senior Vice President of Global Marketing, Sales and Support, Mike Noonen, will keynote at the SemIsrael Expo
The financial technology sector converged on Las Vegas for Money 20/20 last week, bringing together the biggest industry names to
Today, on October 16th, 2018, Rambus has announced the collaboration with Riscure, a global security lab based in San Francisco,
Our world is growing increasingly connected, and while most people have reaped the benefits of interconnectivity, ranging from social networks
People are living in an age with an unprecedented level of access to all kinds of information. Users of social media and networks can contact their far away friends in real time, and have access to events right as they develop. Such technology was the stuff of dreams, only imagined in science fiction stories in the late 20th century. Yet, the unprecedented access to citizens’ private information is something only imagined in George Orwell’s 1984 as well.
The single software ecosystem built on the RISC-V standard allows for OEMs to bypass having to lock into a specific processer ecosystem. When an OEM chooses a particular processor type, it not only has to pay for that particular processor, but it has to continue to purchase from whichever company it purchased it processor from, leading to a market where profits are not driven by competition
Dubbed “Foreshadow,” this speculative execution attack allows an attacker to steal sensitive information stored inside personal computers or third-party clouds. There are two versions: the original attack designed to extract data from Software Guard Extensions (SGX) enclaves and a next-generation version that affects virtual machines (VM), hypervisors, operating system kernel memory, and System Management Mode (SMM) memory. SGX is a new feature in modern CPUs which allows computers to protect users’ data, even if the entire system falls under the attacker’s control.
At the second annual DEF CON Voting Village, a part of the convention that seeks to exploit voting machines to better understand vulnerabilities, an 11-year old boy managed to hack into a replica of the Florida state election website, making it appear that 2016 independent presidential candidate Darrell Castle won the state.
According to a new report published by Bain and Company, the combined markets of the Internet of Things (IoT) will