As global interconnectivity and dependence on digital technologies increase, so does the prevalence of cybercrime. In fact, 2023 witnessed a 72% rise in data breaches compared to 2021, which previously held the record, according to Forbes. As cyber threats become more sophisticated and frequent, organizations must adopt proactive approaches to safeguard their systems, data, and operations. One of the proactive approaches includes implementing cyber resilience—the ability to withstand attac...
Read more...
The rapid digitalization of enterprise environments, coupled with a surge in sophisticated cyber threats, evolving security regulations, and the rise of quantum computing technology, has created a perfect storm in the cybersecurity landscape that demands heightened levels of agility and resiliency. To combat this, organizations must remain proactive in their approach to cyber defense and compliance. In the latest Lattice Security Seminar, Lattice security experts sat down with partners from AMI ...
Read more...
Posted 09/10/2024 by Matt Dobrodziej, VP of Segment Marketing and Mark Hoopes, Director of Automotive & Industrial Segment Marketing
AI is evolving at a rapid pace not just from continued technology advancements, but also by various industries’ demands and requirements. With the surge of Large Language Models (LLMs) and Generative AI, the industry is grappling with the intense compute capabilities these cloud-based AI applications require to process big data, as well as train and deploy advanced AI models. Now, the industry is seeing AI being implemented into client devices including PCs and smartphones, and Edge applic...
Read more...
When it comes to embedded devices, security has always been a big topic of interest. Unfortunately, up until now, much of the attention has been for the wrong reasons. Insecure edge computing and IoT devices have become notorious examples of how the weakest (and often overlooked) link in the chain can lead to big security breaches.
Thankfully, there are now important new options for ensuring that critical features such as hardware root-of-trust, integrated cryptography, firmware resiliency and m...
Read more...
Posted 08/14/2024 by Mamta Gupta, Senior Director of Security, Datacenter and Comms segment marketing
On August 13, 2024, the US National Institute of Standards and Technology (NIST) released the eagerly awaited Post-Quantum Cryptography (PQC) standards. These standards introduce three new encryption algorithms designed to secure systems against both classical and future quantum computer attacks, providing a necessary evolution from RSA and ECC asymmetric encryption algorithms. In this blog, we outline the impact of these standards and the essential steps for system designers to transition to PQ...
Read more...
Field programmable gate arrays (FPGAs) play an important role in a multitude of today’s technology. From aerospace and defense to consumer electronics to critical infrastructure and the automotive industry, the prevalence of FPGAs in our lives is growing. Also growing are the threats to those FPGAs. The resources spent to create the IP (Intellectual Property) that runs (firmware) inside FPGAs are vast, as is the technology protected by these FPGAs. This makes FPGAs a potential target for ...
Read more...
The cyberthreat landscape is reaching unprecedented levels, underscoring the need for resilient security strategies across all sectors. Forbes has reported a shocking 72% increase in data breaches year-over-year since 2021. With the average data breach inflicting a staggering $4.45 million loss on an organization, it’s clear that cyber resilience is not just important but essential for the survival and health of any enterprise in today’s digital age.
However, building that resilienc...
Read more...
In the world of FPGAs, design software plays a crucial role in the overall system development process, making end-to-end programming easier with advanced features to enable design flexibility while fully utilizing the device capabilities.
However, oftentimes, non-FPGA designers or first-time users can experience a steep learning curve as FPGA-based System-on-chip (SoC) design is a multidisciplinary undertaking, requiring expertise in hardware architecture, embedded software, system integration,...
Read more...
In the ever-evolving landscape of cybersecurity, this year’s Global Cybersecurity Outlook from the World Economic Forum provides crucial insights into the multifaceted challenges facing leaders across the globe. Geopolitical instability, rapidly advancing technologies, and an increasing gap in organizational cyber capabilities reinforce the need to build resilience and enable systemic global collaboration.
As threats like sophisticated ransomware, firmware attacks, and the expanded use of...
Read more...
Electronics products can frequently run in excess of 20-year product lifecycles. This fact clearly makes product longevity an important device selection criterion for FPGAs. No company wants to face a rushed last time buy or an unexpected board redesign due to FPGA obsolescence. Finding a suitable supplier of an obsolete part can be a complex undertaking, especially if the original FPGA design team has long since departed from your organization.
Between 2020 and present, some FPGA suppliers hav...
Read more...