We explain the NHTSA’s latest automotive cybersecurity best practices, including guidelines to protect automotive ECUs and connected vehicle technologies.
IoT security is an ongoing battle, requiring innovative solutions to secure data. Explore the latest IoT security solutions & the impact of IoT SoC design.
Connected vehicles are now part of the Internet of Things, and need IoT security to match. Explore automotive cybersecurity & the NHTSA, SAE & ISO standards.
Explore what’s next in automotive sensors, such as the roles of edge computing & sensor fusion and impact of sensor degradation & software lifecycle management.
Cloud computing security starts at hyperscale data centers; learn how embedded IDE modules protect data across interfaces including PCIe 5.0 and CXL 2.0.
We cap off 2020 with a look at this year’s Smart Everything developments, including AI advancements, new EDA tools, 5G’s global rollout, and security in design.
Synopsys CSO Deirdre Hanford discusses cybersecurity threats, best practices, and the “Human Firewall.”
Attackers often take advantage of the complexity that comes with balancing greater end-user convenience with traditional security. Behind that cool and responsive interface of an IoT device is millions of lines of code and superfast processing. The weakest link is something basic — a faulty implementation of a protocol, or a lack of a trusted security zone on a chip. Exploitation, in either case, requires very little skill. Thus, a lot of the attacks today are carried out not by criminals with elite skills but those with very basic programming skills.
Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.
Posted in Application Security, Artificial Intelligence, Automotive, Cryptography, EDA, Healthcare, Internet of Things, IP, Machine Learning, Malware, Optical Design, Privacy, Quantum Computing, Robotics, Security, Superconducting Electronics, TCAD
When security researchers first demonstrated that they could hack a car over the internet to control its brakes and transmission, Chrysler had to recall 1.4 million vehicles to fix the software vulnerability. The infamous Jeep hack of 2015 was an expensive wake-up call for the automotive industry. So, what has changed since then?