Perhaps not surprisingly in the light of all the cyber-attacks and data breaches we’ve been seeing recently, the topics of cyber-security, cyber-resiliency, and securing one’s supply chains are at the forefront of our minds.
Several of my own columns have touched these topics in recent months, such as Read More → "High Entropy is the Foundation for High Security"
When most people hear the term “counterfeiting,” their knee-jerk reaction is to think of currency, the counterfeiting of which is as old as the concept of money itself. Around 400 BC, for example, metal coins in Greece were often counterfeited by covering a cheap-and-cheerful material with a thin layer of a more precious metal.
Or take the original American colonies. Throughout northeastern America, Native Americans would employ shell … Read More → "ID for the IoT? We Need the IDoT!"
I was brought up by my parents to have a suite of core values, including the fact that it was wrong to tell porky pies and that it would be despicable beyond words to pilfer, pinch, or purloin anything from anyone. Shortly after I graduated from university, soon after I moved to commence my first job at International Computers Limited (ICL) in Manchester, England, I was burgled. The callous swine took the only thing I owned that was worth anything — a brand-new rubber-handled hammer that I’d purchased out of my first pay-packet. … Read More → "Yay! Finally! A Way to Secure the Supply Chain!"
I’m currently running around in ever-decreasing circles shouting, “Don’t Panic!” because I’m trying to spin too many plates and juggle too many balls and I was never trained to spin and can’t juggle. Hmmm, now that I come to think about it, that’s not strictly true because I once read a book on the art of juggling and — as a result — … Read More → "Mechatronics Meets No-Code Voice AI"
In just a moment we are going to cogitate and ruminate over the question of how to secure our RISC-V-based systems, but first…
Deep in the mists of time in that awesome decade we used to call the 1970s, although I was in my teens and many exciting things were occurring to capture my attention, I still remember my excitement when 8-bit microprocessors began to arrive on … Read More → "Securing RISC-V-Based Systems"