Zephyrnet Logo

Tag: Blogs - Security

Security Solutions In A World Of IoT Devices

Internet of Things (IoT) devices are everywhere these days adding tremendous value, but unfortunately also representing unprecedented levels of risk for exploitation. Anything that...

Top News

Formula 1: Riding The Sustainability Wave To Full Electrification

Ferdinand Porsche once said, “The perfect race car crosses the finish line 1st and then crumbles into its individual parts.” What a take, right?...

Streamline DO-254 Compliance With Model-Based Design

By Eric Cigan, MathWorks, and Jacob Wiltgen, Siemens EDA The purpose of DO-254 (formally known as RTCA/ DO-254 or ED80) is to provide guidance for...

The Automotive Paradigm Shift

We are currently experiencing a pivotal moment concerning the automotive industry. Three major technology areas are converging. First, there is an enormous demand for...

Securing The Aerospace And Defense Microelectronics Supply Chain With DoD Trusted Suppliers

Since our inception 35 years ago, Synopsys has supported the U.S. defense industry. Over the last five years, we’ve increased our efforts with the...

Scalability: A Looming Problem In Safety Analysis

The boundless possibilities of automation in cars and other vehicles have captivated designers to the point that electronic content is now a stronger driver...

Securing The Semiconductor Supply Chain With Secure Provisioning

The level of awareness of supply chain risks is rising and threats are being seen on many fronts. The Semiconductor Industry Association has reported...

Building Trust Through Certification Of Security Solutions

Certification is all around us in our daily lives. When it comes to making decisions, we look for certain labels, stamps, and symbols indicating...

Hertzbleed: Prime Time For Power Side Channel Countermeasures Or Novelty Attack?

Hertzbleed is a new side-channel attack that turns a power side channel into a timing side channel. That timing side channel may be exploitable even...

Time For FMEDA Reuse?

How do designers quantify safety in electronic systems? Through one or more tables called Failure Modes, Effects and Diagnostic Analysis – FMEDA. In fact,...

Toward Democratized IC Design And Customized Computing

Integrated circuit (IC) design is often considered a “black art,” restricted to only those with advanced degrees or years of training in electrical engineering....

The Methods Of Memory Encryption To Protect Data In Use

In my blog “The Importance of Memory Encryption for Protecting Data in Use,” I discussed the growing industry consensus on the imperative of incorporating...

Data Security Drives Innovative Verification Capabilities For SoCs

The protection and integrity of data is a key challenge for organizations and businesses as human interactions with computers have expanded enormously. This has...

Latest Intelligence

spot_img
spot_img