The days of building a moat around the castle to keep data secure were long gone before the pandemic led to a surge in remote work. With the enterprise network no longer rooted in a single place, every connection needs to be secured in line with increased server connectivity bandwidth requirements of cloud and edge computing.
Security IP
Interview: NXP CEO Kurt Sievers | Cryptographers vs. Quantum Computers | The 8088
In this episode…Kurt Sievers is the new CEO of NXP, a job he’s been groomed for … for several years. We have an exclusive interview with Sievers, who discusses where NXP is going, and how he’s going to get it there. Also, quantum computing seems to threaten the very idea of cryptography. But that’s far from a guarantee. Today on the program we talk with Helena Handschuh from Rambus, who is one of the cryptography experts helping to devise algorithms to stand up against the most powerful computers man can conceive of.
Securing the Silicon Supply Chain
I don’t know about you, but when I hear the name Rambus, I think of the company that was founded in 1990. I remember them leaping into the limelight with a fanfare of trumpets. Well, if the truth be told, it was with their 600 MHz interface technology, which addressed the memory bottleneck issues being faced by system designers of the time, but hearing their sumptuous specifications was the computer engineering equivalent of having one’s ears massaged by a magnificence of mellophones.
Dangers of Counterfeit Semi Chips
In 2019, the worldwide fake semi market was estimated at $75 billion according to Industry Week. This counterfeit chip market particularly prevalent in the government and defense industries. According to a US government report, more than 1 million counterfeit electronic components were used in 1,800 instances affecting military aircraft and missiles.
Hardware Attack Surface Widening
An expanding attack surface in hardware, coupled with increasing complexity inside and outside of chips, is making it far more difficult to secure systems against a variety of new and existing types of attacks. Security experts have been warning about the growing threat for some time, but it is being made worse by the need to gather data from more places and to process it with AI/ML/DL. So even though efforts are beginning to solidify around secure methodologies and technologies, they are not keeping pace with the growth in data and advancing technology that can turn that data into valuable information.
Securing our IoT future
The holiday season brought with it a surge of new IoT devices, from smart toys and doorbells to automatic pet feeders – and it doesn’t stop there. According to IDC, investment in IoT is predicted to top $1 trillion in 2020. As our homes, businesses and cities become more connected than ever before, this number will only continue to rise. However, whilst the desire and demand for all-things IoT has taken centre-stage, it presents numerous challenges to security. If we want the connected age deliver on its promised benefits, security must take front and centre.