Posted 04/16/2026 by Mamta Gupta, AVP, Strategic Business Development, Datacenter & Security
In early 2026, a quiet shift became impossible to ignore: artificial intelligence (AI) moved from helping defenders to operating like an attacker at scale. The cybersecurity community took notice when researchers revealed that an advanced AI system, known publicly as Claude Mythos Preview, was able to independently discover and exploit serious software vulnerabilities. Many of these weaknesses had existed for years in widely used operating systems and software, despite extensive testing and revi...
Read more...
That question opens Lattice Semiconductor’s recent Security Seminar, and it becomes more urgent as humanoids move beyond research environments and begin operating around and interacting with people. Mechanical safeguards and functional safety standards address only part of the risk. When control systems, firmware updates, or data paths can be compromised, security directly determines physical safety.
In this seminar, experts from Lattice Semiconductor, SEALSQ, and Promwad examine the real...
Read more...
One of the year’s largest global trade shows,
embedded world
is a place for Lattice and its industry partners to gather and discuss the innovative solutions enabling engineers to deploy intelligent, scalable designs from cloud to sensor. If we missed you at the event, here’s a snapshot of our presence at embedded world 2026.
Showcasing Key Solutions for Tomorrow’s Embedded Challenges, Today
Over the course of the conference, the Lattice team had the opportunity to present...
Read more...
When it comes to making predictions, sometimes you really have to go out on a limb and sometimes, well, it’s pretty easy. In 2026, there’s zero doubt that AI, generative AI, and agentic AI will continue to be the key buzzwords driving the tech industry forward.
Perhaps a bit less obvious is this year should also mark the beginnings of a growing opportunity in Edge AI, where AI-focused workloads can run in disconnected environments and/or locally on client type devices. The combinati...
Read more...
The transition to post-quantum cryptography (PQC) is not a theoretical future event. It is the largest cryptographic migration in modern history, already shaping product roadmaps, standards bodies, and infrastructure planning across servers, AI datacenters, telecom, industrial automation, and critical systems.
In this interview, we sat down with Mamta Gupta, a leader driving Lattice’s quantum-safe security strategy, to discuss Quantum Day (Q-Day) readiness, crypto-agility, Security Proto...
Read more...
Our digital world is undergoing a profound transformation. Cloud computing, artificial intelligence (AI) and machine learning (ML) workloads, as well as the emergence of quantum computing capabilities, are reshaping how networks must be protected and secured. What’s more, these changes come amid evolving risks & regulations – from the prevalence of “harvest now; decrypt later” attacks, to updated standards like the Commercial National Security Algorithm Suite (CNSA) 2...
Read more...
Each year, the Open Compute Project (OCP) Global Summit brings together the tech industry’s most innovative thinkers to discuss the current and future state of open hardware and software solutions. This year, Lattice and our ecosystem partners had the opportunity to showcase a range of our Field Programmable Gate Array (FPGA)-based solutions that help enable OCP-compliant development of datacenters, artificial intelligence (AI) solutions, and more.
In case you missed the show, here’...
Read more...
One of the more exciting developments now happening in the high-tech world is the work being done to enable quantum computing. After decades of theoretical discussion and development, the last few years have shown tangible progress in this radically different (and enormously complex) new method of computing. Quantum computers essentially perform calculations by flipping the electrical charge of individual atoms and allowing them to simultaneously exist in more than one state through a process ca...
Read more...
Quantum computing is no longer just a concept confined to research labs. Thanks to rapid progress in both hardware and algorithms, the risk to today’s cryptographic systems is steadily increasing. In 2025, Google’s 105-qubit Willow chip and Microsoft’s Majorana 1 processor demonstrated that scalable quantum systems are moving closer to practical reality. Industry experts now predict that quantum computers capable of breaking RSA-2048 encryption could arrive as early as 2030 to ...
Read more...
Posted 09/19/2025 by Mamta Gupta, AVP Strategic Business Development for Security, Telecommunications, and Datacenters, Lattice Semiconductor; Eric Sivertson, VP of Security Business, Lattice Semiconductor
Building and maintaining connected digital ecosystems that account for today’s evolving cyber threat landscape requires a degree of hardware-based trust, as software-only security approaches are no longer sufficient to protect complex, distributed systems
Luckily, today’s developers can reference a foundational example of hardware-based security that has existed for decades: the Trusted Platform Module (TPM). With over four billion TPM units deployed globally across a wide range of u...
Read more...