Lattice Blog

Protect, Detect, and Recover – How to Make Your System Cyber Resilient Blog Graphic Blog Graphic

Protect, Detect, and Recover – How to Make Your System Cyber Resilient

Posted 06/16/2022 by Eric Sivertson, Mamta Gupta

Lattice’s latest security seminar, during which we were joined by our partner AMI focused on cybersecurity topics for firmware and supply chain protection in the compute and datacenter applications. If you missed the live event, you can watch a recording of the “Cyber Resiliency for Firmware Protections & Supply Chain Security” seminar here, or read on to explore some of the highlights. Today’s global supply chain has become a very fragile and brittle environment as ...

Read more...
CyRes vs CySec Title

Cybersecurity and Cyber Resiliency: A Comparison

Posted 09/28/2021 by Mamta Gupta and Eric Sivertson

A HRoT confirms validity of firmware before boot to help ensure a system is cyber resilient (able to to automatically detect/protect/recover from attacks).

Read more...
Cyber Resiliency Solutions and Supply Chain Protections for a Post-Pandemic World

Cyber Resiliency Solutions and Supply Chain Protections for a Post-Pandemic World

Posted 04/01/2021 by Eric Sivertson

At a security seminar in March of 2021, Lattice Semiconductor addressed the concepts of cyber resiliency and protecting supply chains from cyberattack.

Read more...
Lattice Expands Capabilities of mVision and Sentry Solutions Stacks

Lattice Expands Capabilities of mVision and Sentry Solutions Stacks

Posted 03/01/2021 by Mark Hoopes and Eric Sivertson

Lattice has released new versions of the Lattice mVision and Sentry solutions stacks with new capabilities to help developers quickly and easily implement embedded vision and firmware security applications.

Read more...
Lattice Sentry and SupplyGuiard: Dynamic Trust and Hardware Security

Lattice Sentry and SupplyGuard: Dynamic Trust and Hardware Security

Posted 08/12/2020 by Eric Sivertson

The Lattice Sentry solutions stack and SupplyGuard supply chain security service helps protect electronic systems against unauthorized access.

Read more...