Home > Search
Found 372 Results
Moor Insights & Strategy senior analyst John Fruehe says more focus should be placed on the “what” of the IoT rather than the “how.” “All of the strategy and shiny objects in the world won’t help if the data isn’t accurate, secure and actionable,” Fruehe wrote in a recent Forbes article. “The data should always […]
Semiconductor Engineering editor in chief Ed Sperling recently reported that the current emphasis on lowering power – in everything from wearable electronics to data centers – is turning into a “perfect storm” for the semiconductor ecosystem. “In the past, most issues involving power—notably current leakage, physical effects such as electromigration, electrostatic discharge, RC delay and […]
Our CryptoManager Infrastructure is a high-performance enterprise class device provisioning solution that reduces operating costs and accelerates time-to-market. It is designed to seamlessly integrate into existing manufacturing flows with minimal interruption.
Security CryptoFirewall Verifier and Consumable Core The CryptoFirewall Verifier and Consumable cores are hardware-based security blocks designed to provide secure authentication and reduce counterfeiting business risk for mass-market consumables and peripherals. For consumable devices like printers, medical devices, batteries and automotive components where extending ‘time to clone’ is essential to business success, CryptoFirewall cores deliver […]
Although encryption is increasingly used to combat security breaches, a salient lack of expertise among developers, coupled with overly complex libraries, has led to widespread implementation failures in business applications. According to IDG’s Lucian Constantin, the scale of the problem is quite significant. Indeed, a recent report published by Veracode confirms that cryptographic issues are […]
Kevin Mitnick recently told the Freescale Technology Forum that the Internet of Things (IoT) is “exploitable.” “I don’t know any system out there that’s impenetrable,” the hacker turned security consultant emphasized during a conference symposium cited by DesignNews. “In our experience, when we are hired by clients to attack their systems, our success rate is […]
Kevin Mitnick recently told the Freescale Technology Forum that the Internet of Things (IoT) is “exploitable.” “I don’t know any system out there that’s impenetrable,” the hacker turned security consultant emphasized during a conference symposium cited by DesignNews. “In our experience, when we are hired by clients to attack their systems, our success rate is […]
From chip-to-cloud-to-crowd, the Rambus Security Division is dedicated to enabling an economy of digital trust for a connected world.
Agreement extended to 2024 SEOUL, Korea and SUNNYVALE, Calif. – June 18 2015 – SK Hynix Inc. and Rambus Inc. (NASDAQ:RMBS), today announced they have signed an amendment that extends the current agreement between the two companies through July 1, 2024 for use of Rambus memory-related patented innovations in SK Hynix semiconductor products. SK Hynix […]
Writing for SemiconductorEngineering, Ernest Worthman notes that while biometrics offer a plethora of potential security-based tools, there are currently only two in wide-scale deployment: fingerprints and facial scanning. Indeed, according to ABI digital security analyst Dimitrios Pavlakis, fingerprints account for 60% to 70% of all biometric applications. Additional technologies eyed by major industry players include […]