From Silicon To Software

Archive for the 'Security' Category

 

NHTSA Shares Best Practices for Improving Automotive Cybersecurity

We explain the NHTSA’s latest automotive cybersecurity best practices, including guidelines to protect automotive ECUs and connected vehicle technologies.

Continue Reading...

Posted in Application Security, Automotive, Security

 

IoT’s Inconvenient Truth: IoT Security Is a Never-Ending Battle

IoT security is an ongoing battle, requiring innovative solutions to secure data. Explore the latest IoT security solutions & the impact of IoT SoC design.

Continue Reading...

Posted in Internet of Things, Security

 

Your Car Is a Smartphone on Wheels—and It Needs Smartphone Security

Connected vehicles are now part of the Internet of Things, and need IoT security to match. Explore automotive cybersecurity & the NHTSA, SAE & ISO standards.

Continue Reading...

Posted in Application Security, Automotive, Security

 

How Sensor Fusion Technology Is Driving Autonomous Cars

Explore what’s next in automotive sensors, such as the roles of edge computing & sensor fusion and impact of sensor degradation & software lifecycle management.

Continue Reading...

Posted in Automotive, Security

 

Keeping Hyperscale Data Centers Safe from Security Threats

Cloud computing security starts at hyperscale data centers; learn how embedded IDE modules protect data across interfaces including PCIe 5.0 and CXL 2.0.

Continue Reading...

Posted in HPC, IP, Security

 

2020 Recap: “Smart Everything” Year in Review

We cap off 2020 with a look at this year’s Smart Everything developments, including AI advancements, new EDA tools, 5G’s global rollout, and security in design.

Continue Reading...

Posted in 5G, Aerospace and Defense, Application Security, Artificial Intelligence, Automotive, EDA, HPC, Inside Synopsys, Internet of Things, Optical Design, Prototyping, Security, Verification

 

Q&A with Synopsys CSO Deirdre Hanford: How Cybersecurity is Driving Business Forward

Synopsys CSO Deirdre Hanford discusses cybersecurity threats, best practices, and the “Human Firewall.”

Continue Reading...

Posted in Privacy, Security

 

Creating IoT Security from Silicon To Software

Attackers often take advantage of the complexity that comes with balancing greater end-user convenience with traditional security. Behind that cool and responsive interface of an IoT device is millions of lines of code and superfast processing. The weakest link is something basic — a faulty implementation of a protocol, or a lack of a trusted security zone on a chip. Exploitation, in either case, requires very little skill. Thus, a lot of the attacks today are carried out not by criminals with elite skills but those with very basic programming skills.

Continue Reading...

Posted in Internet of Things, Security

 

Harnessing the Power of Women in Tech: a USA Today Feature

Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.

Continue Reading...

Posted in Application Security, Artificial Intelligence, Automotive, Cryptography, EDA, Healthcare, Internet of Things, IP, Machine Learning, Malware, Optical Design, Privacy, Quantum Computing, Robotics, Security, Superconducting Electronics, TCAD

 

MISRA Compliance: Hit the Road with More Secure Cars

When security researchers first demonstrated that they could hack a car over the internet to control its brakes and transmission, Chrysler had to recall 1.4 million vehicles to fix the software vulnerability. The infamous Jeep hack of 2015 was an expensive wake-up call for the automotive industry. So, what has changed since then?

Continue Reading...

Posted in Application Security, Internet of Things, Security