Security
Subscribe Now

Using Generative AI for Refactoring and Debugging Code Cuts Debugging Time in Half!

I am currently wearing my patent-pending puzzled and perplexed expression. This manly mien was handed down to me by my father when he determined he had no further use for it. It was the aspect he assumed when my mother requested him to undertake some chore around the house. Oftentimes, he managed to look so befuddled and bewildered that she ended up performing the task herself. I’ … Read More → "Using Generative AI for Refactoring and Debugging Code Cuts Debugging Time in Half!"

We’re Going Back to the Moon (and LDRA is Helping to Get Us There)!

I’m scared of being in a submarine. I don’t know why because I’ve never been on (or should it be “in”) one of these magnificent machines. One of my friends used to be a submariner and he regaled me with some awesome anecdotes, but nothing he said would persuade me to dive in, as it were. I think it’s the thought of … Read More → "We’re Going Back to the Moon (and LDRA is Helping to Get Us There)!"

Yes! On-Chip (FPGA, MCU, SoC) Generation of Post-Quantum Secure IDs and Keys

Just to keep things interesting, we’re going to come at things from a slightly different direction to my usual columns. First, I’m going to tell you something you already know. Second, I’m going to tell you something of which you are probably aware. Third, once I’ve lulled you into a false sense of security, I’m going to surprise you with something … Read More → "Yes! On-Chip (FPGA, MCU, SoC) Generation of Post-Quantum Secure IDs and Keys"

Everything is Connected, Everything is At Risk: How Intrinsic ID is Helping Create a World That Can Be Trusted

“The Internet of Things devoid of comprehensive security management is tantamount to Internet of Threats” -Stephane Nappo

This week my distinguished guest is Pim Tuyls, CEO and Founder of Intrinsic ID! Pim and I investigate today’s biggest security trends, the details of Intrinsic ID’s new software-only solution called Zign, and why Pim thinks that US Cybersecurity Chip Act isn’t quite … Read More → "Everything is Connected, Everything is At Risk: How Intrinsic ID is Helping Create a World That Can Be Trusted"

May 17, 2023
April 28, 2023
April 13, 2023
March 13, 2023
February 28, 2023
February 24, 2023
February 23, 2023
February 17, 2023
February 15, 2023
February 10, 2023
January 27, 2023
January 24, 2023
December 27, 2022
December 19, 2022
December 14, 2022
December 8, 2022
November 28, 2022
November 21, 2022
November 15, 2022
November 10, 2022
October 24, 2022
October 4, 2022
September 6, 2022
August 4, 2022
featured blogs
Jun 1, 2023
Cadence was a proud sponsor of the SEMINATEC 2023 conference, held at the University of Campinas in Brazil from March 29-31, 2023. This conference brings together industry representatives, academia, research and development centers, government organizations, and students to d...
Jun 1, 2023
In honor of Pride Month, members of our Synopsys PRIDE employee resource group (ERG) share thoughtful lessons on becoming an LGBTQIA+ ally and more. The post Pride Month 2023: Thoughtful Lessons from the Synopsys PRIDE ERG appeared first on New Horizons for Chip Design....
May 8, 2023
If you are planning on traveling to Turkey in the not-so-distant future, then I have a favor to ask....
chalk talks
Software and Automotive Safety — Siemens  In the realm of automotive designs, safety must reign above all else. But the question remains: how can we innovate within the constraints of today’s safety standards? In this episode of Chalk Talk, Amelia Dalton chats with Rob Bates from Siemens about the role ISO 26262 plays when it comes to COTS and open … Read More → "Software and Automotive Safety — Siemens"
Security Regulations Drive Requirements — Silicon Labs and Mouser Electronics  IoT Security certification schemes can be complex, but security identities and security certification inheritance can make this aspect of your IoT design quite a bit easier. In this episode of Chalk Talk, Amelia Dalton chats with Mike Dow from Silicon Labs about the current state of global security regulations, the difference between physical and … Read More → "Security Regulations Drive Requirements — Silicon Labs and Mouser Electronics"
Medical Device Security – Mentor  In the new era of connected medical devices, securing embedded systems has become more important than ever. But, there is a lot medical device designers can borrow from current best-practices for embedded security in general. In this episode of Chalk Talk, Amelia Dalton chats with Robert Bates from Mentor about strategies and challenges for … Read More → "Medical Device Security – Mentor"
Keeping Your Linux Device Secure — Siemens   Embedded security is an ongoing process, not a one-time effort. Even after your design is shipped, security vulnerabilities are certain to be discovered – even in things like the operating system. In this episode of Chalk Talk, Amelia Dalton chats with Kathy Tufto from Siemens, about how to make a plan to keep … Read More → "Keeping Your Linux Device Secure — Siemens"
Maxim’s First Secure Micro with ChipDNA PUF Technology — Maxim Integrated and Mouser Electronics   Most applications today demand security, and that starts with your microcontroller. In order to get a truly secure MCU, you need a root of trust such as a physically unclonable function (PUF). In this episode of Chalk Talk, Amelia Dalton chats with Kris Ardis of Maxim Integrated about how the Maxim MAX32520 MCU … Read More → "Maxim’s First Secure Micro with ChipDNA PUF Technology — Maxim Integrated and Mouser Electronics"
Series 2 Product Security — Silicon Labs and Mouser Electronics  Side channel attacks such as differential power analysis (DPA) present a serious threat to our embedded designs. If we want to defend our systems from DPA and similar attacks, it is critical that we have a secure boot and root of trust. In this episode of Chalk Talk, Amelia Dalton chats with Gregory Guez … Read More → "Series 2 Product Security — Silicon Labs and Mouser Electronics"