Special Report: A combination of increasingly complex designs, more connected devices, and a mix of different generations of security technology are creating a whole new set of concerns about the safety of data nearly everywhere. While security experts have been warning of a growing threat in electronics for decades, several recent fundamental changes elevate the risk. By Adam Kovac. https://lnkd.in/eYKkcM-X #datasecurity #cybersecurity #GenAI #hardwaresecurity #RootOfTrust David Maidment Arm Infineon Technologies Mike Borza Synopsys Inc Siemens EDA (Siemens Digital Industries Software) Lee Harrison Cycuity Jason Oberg TXOne Networks Jim Montgomery Microsoft
Semiconductor Engineering’s Post
More Relevant Posts
-
Award-winning AI & Automation Expert | Keynote Speaker, Influencer & Best-Selling Author | Forbes Tech Council | 2 million+ followers | Follow me to thrive in the age of AI and become IRREPLACEABLE ✔️
Is Your Business Data Safe During Processing? Here’s How Intel Xeon 6 Protects It. 🛡️ In today’s digital landscape, protecting sensitive business data during processing is critical. Intel’s latest security features, Intel SGX and Intel TDX, built into the new #IntelXeon 6 processors, are designed to enhance data security in ways that directly benefit businesses: 🔒 Intel SGX (Software Guard Extensions): This technology encrypts a specific portion of memory called an enclave, ensuring that any data or code processed within this secure area remains hidden from unauthorized access, even from other software running on the same system. For businesses, this means enhanced protection as you process sensitive information like customer data, financial records, and proprietary algorithms, minimizing the risk of data breaches. 🛡️ Intel TDX (Trusted Domain Extensions): The newest confidential computing technology from Intel, TDX provides hardware-level isolation within virtual machines (VMs), reducing the attack surface and bolstering data and application confidentiality. This is especially critical for businesses operating in the cloud or multi-tenant environments, ensuring that their data remains secure, isolated, and protected from unauthorized access. With Intel Xeon 6 processors, these businesses can operate with confidence, knowing that their data is secure even in shared environments. With these advanced security measures, businesses can confidently innovate while safeguarding against cyber threats, data breaches, and compliance issues. The Intel Xeon 6 processors play a crucial role in ensuring that your data processing is compliant with industry standards and regulations, thereby safeguarding your company’s reputation and standing. Secure your business operations with Intel Xeon 6’s advanced security technologies—because protecting your data is protecting your business. #IntelAmbassador Intel Corporation Intel AI #IntelXeon #AI #Cybersecurity
To view or add a comment, sign in
-
Ex-Amazon Software Engineer| System Software Architect | ARM & RISC-V Specialist | NVIDIA GPU/DPU Expert | PCIe & CXL Innovator
https://lnkd.in/gw_9eUsh Thermal remains an issue for chips especially when more and more performance is being squeezed. This article is an eye opener on thermal issues becoming security risks. I especially would highlight remote attacks from the post: "Denial of service attacks can be done this way,” said Best. “You could shut down a remote server by causing some sort of malicious hardware to start consuming way more performance than it was actually intended to do. Usually these remote servers allocate very carefully the number of compute cycles that are allowed by any one of the clients, and they’re happy to bill you per CPU cycle that you’re actually using. So if you’re consuming that many cycles, they might move you to your own private server and just charge you an infinite amount of money, but you’re not going to bring down that server. They’re just going to keep charging you more money and moving your compute load to other blades to manage the overall. So it is a path to potential denial of service if you could bring a server down, but there are so many protections in place for limiting the amount of CPU that any one user can perform a normal data center setting." #chips #asic #soc #cpu #nand #ssd #boot #bootrom #cryptography #encryption #Decryption #memory #sidechannelattacks #hackers #remotehacking #ddos #security #cpucycles #bladeserver #thermal #power #heatsinks #temperature #securitygapassessment
Temperature: A Growing Concern For Chip Security Experts
https://semiengineering.com
To view or add a comment, sign in
-
Microchip Technology says operations disrupted by cyberattack. Key takeaways: 1. This incident signifies the inherent vulnerability of semiconductor companies to cyberattack, which can disrupt operations and potentially delay delivery of essential technology in various critical sectors, including automotive, industrial, aerospace, and defense. 2. The attack on Microchip underlines how crucial it is for companies, specifically those in the technology and manufacturing sectors, to have robust cybersecurity measures that can detect, isolate, and respond to threats promptly. With the origin and full scope of this incident yet unknown, it underscores the sophistication and stealth of cyber attackers. 3. The disruption also feeds into broader US concerns over domestic semiconductor sovereignty and national security, as the government has earmarked billions for domestic semiconductor manufacturing and research to counter potential misuse of technology by foreign adversaries. Learn more by visiting The Record from Recorded Future News: https://lnkd.in/gfUZF6wz
Microchip Technology says operations disrupted by cyberattack
therecord.media
To view or add a comment, sign in
-
**Title: Intel Introduces Core Ultra VPro Processors: Elevating Security and Management for Businesses** Intel has recently launched its latest innovation in the realm of business computing: the Core Ultra VPro processors. Engineered to bolster security and streamline management tasks, these processors represent a significant advancement in the technology landscape for enterprises. With cybersecurity threats on the rise, businesses are increasingly prioritizing robust security measures. The Core Ultra VPro processors offer advanced security features, including hardware-based protections, threat detection, and mitigation capabilities. These enhancements ensure data integrity and confidentiality, safeguarding sensitive information from potential breaches. Moreover, the processors empower IT administrators with enhanced remote management capabilities, enabling efficient monitoring, troubleshooting, and maintenance of corporate devices. This streamlined approach minimizes downtime, maximizes productivity, and optimizes resource utilization across the organization. In essence, Intel's Core Ultra VPro processors herald a new era of business computing, where security and management are seamlessly integrated into the core architecture, fortifying businesses against evolving threats while enhancing operational efficiency. #intelcore #intelcoreultra #it #vpro #informationtechnology
To view or add a comment, sign in
-
Recruitment Consultant - Placing highly skilled talent in the UK & European IT Market - DevOps, Engineers, Solution Architects, PMs, Delivery Leads
How soon will #AIPCs replace traditional PCs in the enterprise? There’s much anticipation among enterprises and consumers alike for AI PCs, the evolution of computing that integrates dedicated AI hardware and software into everyday machines. But as with any new technology, it’s unclear when AI PCs will finally have their moment. Top analyst firms, including Gartner and IDC, certainly have high expectations for the technology, based on new reports out this week. Gartner forecasts that 43 million AI PCs will be shipped this year. Similarly, IDC predicts that 57 million units will be shipped in 2024, and by 2028, AI PCs will represent 92% of all PC shipments worldwide. #cybersecurity #infosec #cyberbaseconsulting #cybersec #cyber #informationsecurity #gartner #aipc #idc #ai
How soon will AI PCs replace traditional PCs in the enterprise?
https://www.computerworld.com
To view or add a comment, sign in
-
Accelerating Innovation in Digital Hardware: Unleashing the Potential of Hardware Acceleration! Diving into the realm of hardware accelerators, I'm captivated by the immense potential they hold to revolutionize computing as we know it. Hardware accelerators are specialized processors designed to offload specific tasks from the CPU. Let's delve into some captivating insights: 1. Acceleration of Cryptographic Hardware: Robust cryptographic solutions are more in demand than ever due to the increase in cyber threats. Hardware accelerators allow cryptographic operations to be executed incredibly quickly, greatly improving speed and saving money. 2. Embedded security: safeguarding sensitive data is critical. By reducing vulnerabilities, freeing up CPU resources, and offloading cryptographic tasks, hardware accelerators are essential for enhancing embedded security. 3. AI Accelerators: These customized processors are perfect for AI-driven applications because they have lower power consumption, lower latency, and better data localization. #HardwareAcceleration #EmbeddedSecurity #Innovation
To view or add a comment, sign in
-
In the age of increased connected devices, expanded compute choices, and the rapid rise of generative AI, data security is more complex than ever before. Our CTO, Jason Oberg + other industry experts offer their insights on the ongoing efforts that can enhance security measures for a more protected future. 🔐 https://lnkd.in/eYKkcM-X #hardwaresecurity #cybersecurity
Securing The World’s Data: A Looming Challenge
https://semiengineering.com
To view or add a comment, sign in
-
Navigating NIS2: The Significance of Cybersecurity in OT Networks Read more: https://lnkd.in/dm4jVJ7t Industrial computing devices and embedded systems are becoming increasingly interconnected as part of the Industrial Internet of Things (IIoT) and Industry 4.0 initiatives. This connectivity brings numerous benefits, such as improved efficiency, predictive maintenance, and data-driven insights. However, this advancement has an ever-present downside: it introduces new cybersecurity challenges. Improvements in cybersecurity technologies and practices are continuously being developed to address these challenges. This includes techniques such as intrusion detection systems, encryption, secure coding practices, network segmentation, and regular security audits and updates. Additionally, there is a growing emphasis on building security into the design of industrial systems from the outset rather than treating it as an afterthought, such as in Moxa's EDS-4000 range which are among the world’s first IEC 62443-4-2 compliant industrial Ethernet switches. Why, then, is it so important to take cyber security seriously in Operational Technology (OT) networks, and what can engineers designing industrial networks do to make their networks more secure? #impulse #innovation #technology #nis2 #ethernetswitches
To view or add a comment, sign in
-
Toshiba and Orange offer quantum secure data transmission with utmost security https://lnkd.in/e4Jdj2k3 Toshiba, the Japanese electronics giant, and Orange, a major telecom company, have unveiled breakthroughs in quantum secure data transmission. Their innovation shields information transmitted over fiber optic networks from cyber threats of all kinds. The advancement relies on Quantum Key Distribution (QKD) technology, enabling secure data transmission at speeds of 400 Gigabits over a 100-mile fiber link. Quantum computing poses a growing threat to public key encryption, commonly used to secure data at rest or in motion. As this technology advances, traditional data networks become increasingly susceptible to attacks. QKD, leveraging the principles of quantum mechanics, addresses this challenge by […]
Toshiba and Orange offer quantum secure data transmission with utmost security
https://www.cybersecurity-insiders.com
To view or add a comment, sign in
-
Beat the heat! Or the heat will beat the system... 🫠 #semiconductor #semiconductorindustry #cybersecurity "Thermal attacks are hardly new, and mainly used for denial of service attacks both by blocking off air vents and by using #software to shut off the system’s fans." Then there is the denial of service through raising the temperature "to the point of forcing the computer to reset. Heat also was used to gradually damage the components, ageing them faster than normal." "But while that’s an annoyance, being able to actually steal #information is much more of a concern.” Yet another hot 🤩 piece by Semiconductor Engineering. 🙏
Temperature: A Growing Concern For Chip Security Experts
https://semiengineering.com
To view or add a comment, sign in
87,383 followers