Found 372 Results

Why the IoT is all about data

https://www.rambus.com/blogs/why-the-iot-is-all-about-data-2/

Moor Insights & Strategy senior analyst John Fruehe says more focus should be placed on the “what” of the IoT rather than the “how.” “All of the strategy and shiny objects in the world won’t help if the data isn’t accurate, secure and actionable,” Fruehe wrote in a recent Forbes article. “The data should always […]

When power becomes a problem

https://www.rambus.com/blogs/when-power-becomes-a-problem-2/

Semiconductor Engineering editor in chief Ed Sperling recently reported that the current emphasis on lowering power – in everything from wearable electronics to data centers – is turning into a “perfect storm” for the semiconductor ecosystem. “In the past, most issues involving power—notably current leakage, physical effects such as electromigration, electrostatic discharge, RC delay and […]

CryptoManager Provisioning

https://www.rambus.com/security/provisioning-and-key-management/cryptomanager-infrastructure/

Our CryptoManager Infrastructure is a high-performance enterprise class device provisioning solution that reduces operating costs and accelerates time-to-market. It is designed to seamlessly integrate into existing manufacturing flows with minimal interruption.

CryptoFirewall Verifier and Consumable Core

https://www.rambus.com/security/anti-counterfeiting/cryptofirewall-consumable-core/

Security CryptoFirewall Verifier and Consumable Core The CryptoFirewall Verifier and Consumable cores are hardware-based security blocks designed to provide secure authentication and reduce counterfeiting business risk for mass-market consumables and peripherals. For consumable devices like printers, medical devices, batteries and automotive components where extending ‘time to clone’ is essential to business success, CryptoFirewall cores deliver […]

Is software crypto failing?

https://www.rambus.com/blogs/security-is-software-crypto-failing/

Although encryption is increasingly used to combat security breaches, a salient lack of expertise among developers, coupled with overly complex libraries, has led to widespread implementation failures in business applications. According to IDG’s Lucian Constantin, the scale of the problem is quite significant. Indeed, a recent report published by Veracode confirms that cryptographic issues are […]

Mitnick says the IoT is exploitable

http://www.rambusblog.com/2015/07/02/mitnick-says-the-iot-is-exploitable/#new_tab

Kevin Mitnick recently told the Freescale Technology Forum that the Internet of Things (IoT) is “exploitable.” “I don’t know any system out there that’s impenetrable,” the hacker turned security consultant emphasized during a conference symposium cited by DesignNews. “In our experience, when we are hired by clients to attack their systems, our success rate is […]

Mitnick says the IoT is exploitable

https://www.rambus.com/blogs/mitnick-says-the-iot-is-exploitable-2/

Kevin Mitnick recently told the Freescale Technology Forum that the Internet of Things (IoT) is “exploitable.” “I don’t know any system out there that’s impenetrable,” the hacker turned security consultant emphasized during a conference symposium cited by DesignNews. “In our experience, when we are hired by clients to attack their systems, our success rate is […]

Security IP

https://www.rambus.com/security/

From chip-to-cloud-to-crowd, the Rambus Security Division is dedicated to enabling an economy of digital trust for a connected world.

Rambus and SK Hynix Extend License Agreement

https://www.rambus.com/rambus-and-sk-hynix-extend-license-agreement/

Agreement extended to 2024 SEOUL, Korea and SUNNYVALE, Calif. – June 18 2015 – SK Hynix Inc. and Rambus Inc. (NASDAQ:RMBS), today announced they have signed an amendment that extends the current agreement between the two companies through July 1, 2024 for use of Rambus memory-related patented innovations in SK Hynix semiconductor products. SK Hynix […]

The Evolution of Biometric Security: Part Two

https://www.rambus.com/blogs/the-evolution-of-biometric-security-part-two-2/

Writing for SemiconductorEngineering, Ernest Worthman notes that while biometrics offer a plethora of potential security-based tools, there are currently only two in wide-scale deployment: fingerprints and facial scanning. Indeed, according to ABI digital security analyst Dimitrios Pavlakis, fingerprints account for 60% to 70% of all biometric applications. Additional technologies eyed by major industry players include […]

Rambus logo