Lattice Blog

Protect, Detect, and Recover – How to Make Your System Cyber Resilient Blog Graphic Blog Graphic

Protect, Detect, and Recover – How to Make Your System Cyber Resilient

Posted 06/16/2022 by Eric Sivertson, Mamta Gupta

Lattice’s latest security seminar, during which we were joined by our partner AMI focused on cybersecurity topics for firmware and supply chain protection in the compute and datacenter applications. If you missed the live event, you can watch a recording of the “Cyber Resiliency for Firmware Protections & Supply Chain Security” seminar here, or read on to explore some of the highlights. Today’s global supply chain has become a very fragile and brittle environment as ...

Is Your Computer Firmware Safe?

New NIST Standard Tackles Latest Attack Vector for Servers

Posted 11/07/2018 by Shyam Chandra

There is an emerging, though not widely known attack vector for hacking a server: firmware. Last month, researchers at ESET published a report on Lojax, a rootkit (firmware hacking tool) believed to have been developed by Sednit, the notorious cyberespionage group linked to Russian military intelligence.

Like most websites, we use cookies and similar technologies to enhance your user experience. We also allow third parties to place cookies on our website. By continuing to use this website you consent to the use of cookies as described in our Cookie Policy.