When it comes to embedded devices, security has always been a big topic of interest. Unfortunately, up until now, much of the attention has been for the wrong reasons. Insecure edge computing and IoT devices have become notorious examples of how the weakest (and often overlooked) link in the chain can lead to big security breaches.
Thankfully, there are now important new options for ensuring that critical features such as hardware root-of-trust, integrated cryptography, firmware resiliency and m...
Read more...
Posted 10/31/2023 by Eric Sivertson, VP of Security Business and Mamta Gupta, Director of Marketing Security & Comms Segment
In today’s rapidly evolving digital landscape, the importance of cyber resilience cannot be overstated. The rise of modern technology – including automation, machine learning (ML), 5G, and artificial intelligence (AI) – has provided us with a host of benefits and advancements, but it has also opened doors for increased vulnerability to cyberattacks. In fact, nearly 75% of organizations have experienced a cyberattack in the past year and, even further, the global average cost o...
Read more...
Organizations face more cyberattacks today than ever before as cyber criminals and bad actors develop new ways to attack systems with each new software and hardware device deployed. In fact, a 2021 Cyber Resilient Organization Study found that 61% of respondents were forced to pay the ransom in a ransomware attack. This metric underscores the fact that being cybersecure is no longer enough, companies today must also be cyber resilient so they can quickly respond to and recover from attacks as th...
Read more...
As public cloud servers and edge computing systems proliferate throughout the datacenter landscape, the importance of security, power efficiency, and overall system performance grows. The rise of IoT and 5G connections demand immense processing capabilities and add pressure to servers like never before. And with quantum computing shaping up to come online by the end of the decade, system designers find themselves tasked with keeping up with these demands as securely and efficiently as possible. ...
Read more...
Lattice’s latest security seminar, during which we were joined by our partner AMI focused on cybersecurity topics for firmware and supply chain protection in the compute and datacenter applications. If you missed the live event, you can watch a recording of the “Cyber Resiliency for Firmware Protections & Supply Chain Security” seminar here, or read on to explore some of the highlights.
Today’s global supply chain has become a very fragile and brittle environment as ...
Read more...
October is Cybersecurity Awareness Month! The Cybersecurity & Infrastructure Agency (CISA) and the National Cyber Security Alliance (NCSA) launched this event 18 years ago to raise awareness about the importance of cybersecurity and to ensure the country has the resources needed to help keep citizens safe and secure online. To continue to encourage individuals and organizations to take a proactive role in protecting themselves in cyberspace, the theme for this year’s Cybersecurity Awar...
Read more...
A HRoT confirms validity of firmware before boot to help ensure a system is cyber resilient (able to to automatically detect/protect/recover from attacks).
Read more...
At a security seminar in March of 2021, Lattice Semiconductor addressed the concepts of cyber resiliency and protecting supply chains from cyberattack.
Read more...
Lattice has released new versions of the Lattice mVision and Sentry solutions stacks with new capabilities to help developers quickly and easily implement embedded vision and firmware security applications.
Read more...
The Lattice Sentry solutions stack and SupplyGuard supply chain security service helps protect electronic systems against unauthorized access.
Read more...
There is an emerging, though not widely known attack vector for hacking a server: firmware. Last month, researchers at ESET published a report on Lojax, a rootkit (firmware hacking tool) believed to have been developed by Sednit, the notorious cyberespionage group linked to Russian military intelligence.
Read more...