As global interconnectivity and dependence on digital technologies increase, so does the prevalence of cybercrime. In fact, 2023 witnessed a 72% rise in data breaches compared to 2021, which previously held the record, according to Forbes. As cyber threats become more sophisticated and frequent, organizations must adopt proactive approaches to safeguard their systems, data, and operations. One of the proactive approaches includes implementing cyber resilience—the ability to withstand attac...
Read more...
The rapid digitalization of enterprise environments, coupled with a surge in sophisticated cyber threats, evolving security regulations, and the rise of quantum computing technology, has created a perfect storm in the cybersecurity landscape that demands heightened levels of agility and resiliency. To combat this, organizations must remain proactive in their approach to cyber defense and compliance. In the latest Lattice Security Seminar, Lattice security experts sat down with partners from AMI ...
Read more...
Posted 08/14/2024 by Mamta Gupta, Senior Director of Security, Datacenter and Comms segment marketing
On August 13, 2024, the US National Institute of Standards and Technology (NIST) released the eagerly awaited Post-Quantum Cryptography (PQC) standards. These standards introduce three new encryption algorithms designed to secure systems against both classical and future quantum computer attacks, providing a necessary evolution from RSA and ECC asymmetric encryption algorithms. In this blog, we outline the impact of these standards and the essential steps for system designers to transition to PQ...
Read more...
Field programmable gate arrays (FPGAs) play an important role in a multitude of today’s technology. From aerospace and defense to consumer electronics to critical infrastructure and the automotive industry, the prevalence of FPGAs in our lives is growing. Also growing are the threats to those FPGAs. The resources spent to create the IP (Intellectual Property) that runs (firmware) inside FPGAs are vast, as is the technology protected by these FPGAs. This makes FPGAs a potential target for ...
Read more...
The cyberthreat landscape is reaching unprecedented levels, underscoring the need for resilient security strategies across all sectors. Forbes has reported a shocking 72% increase in data breaches year-over-year since 2021. With the average data breach inflicting a staggering $4.45 million loss on an organization, it’s clear that cyber resilience is not just important but essential for the survival and health of any enterprise in today’s digital age.
However, building that resilienc...
Read more...
In the ever-evolving landscape of cybersecurity, this year’s Global Cybersecurity Outlook from the World Economic Forum provides crucial insights into the multifaceted challenges facing leaders across the globe. Geopolitical instability, rapidly advancing technologies, and an increasing gap in organizational cyber capabilities reinforce the need to build resilience and enable systemic global collaboration.
As threats like sophisticated ransomware, firmware attacks, and the expanded use of...
Read more...
In today’s data-driven world, artificial intelligence (AI), machine learning (ML), and digital twin technologies are transforming industries, revolutionizing processes, and reshaping enterprise business environments. With more than 328 million terabytes of data created each day, it has become the new “oil” – providing the energy needed to fuel next generation digital systems.
However, the effectiveness and reliability of these technologies heavily depends on the quality ...
Read more...
Living in a digital era where we continue to see a rapidly expanding number of devices and systems integrating into every aspect of our lives, new security challenges are emerging and exposing system and application weaknesses. It is crucial for security architects, engineers, program managers, and business managers to keep pace with the latest regulations and requirements to design compliant solutions.
To support this, Lattice security experts recently sat down to discuss the security-related h...
Read more...
It is a widely held misconception that companies have more than a decade to migrate to Post Quantum Cryptography (PQC) solutions to protect against quantum computers easily breaking RSA (Rivest–Shamir–Adleman) and ECC (Elliptic Curve Cryptography), the currently used asymmetric encryption algorithms. The reality is that quantum computing technology development is speeding up and we must begin adopting the new PQC algorithms now, as the transition takes time. Many of the devices under...
Read more...
With Lattice recently hosted other industry leaders and the vibrant FPGA ecosystem during the inaugural Lattice Developers Conference to explore the latest trends and opportunities for programmable solutions. Joined by experts in Artificial Intelligence (AI), Security, Advanced Connectivity, and more, the Lattice Developers Conference showcased Lattice’s strong and growing global ecosystem of customers, IP & reference platform partners, and developers fostering power efficiency, p...
Read more...