Quantum computing has long been discussed as a far-off development in computer science. The claim that widespread accessibility and use is “just five years away” is a common refrain among many practitioners. But with recent advancements in the field—including Microsoft’s Majorana 1, Google’s Willow chip, and IBM's plans to release the largest-ever quantum computer in 2025— we are closer to realizing its potential than ever before. While exciting, these advance...
When it comes to embedded devices, security has always been a big topic of interest. Unfortunately, up until now, much of the attention has been for the wrong reasons. Insecure edge computing and IoT devices have become notorious examples of how the weakest (and often overlooked) link in the chain can lead to big security breaches. Thankfully, there are now important new options for ensuring that critical features such as hardware root-of-trust, integrated cryptography, firmware resiliency and m...
On August 13, 2024, the US National Institute of Standards and Technology (NIST) released the eagerly awaited Post-Quantum Cryptography (PQC) standards. These standards introduce three new encryption algorithms designed to secure systems against both classical and future quantum computer attacks, providing a necessary evolution from RSA and ECC asymmetric encryption algorithms. In this blog, we outline the impact of these standards and the essential steps for system designers to transition to PQ...
Living in a digital era where we continue to see a rapidly expanding number of devices and systems integrating into every aspect of our lives, new security challenges are emerging and exposing system and application weaknesses. It is crucial for security architects, engineers, program managers, and business managers to keep pace with the latest regulations and requirements to design compliant solutions. To support this, Lattice security experts recently sat down to discuss the security-related h...
Cyberthreats are accelerating amidst the rise of enterprise digital transformation. In order to keep pace with increased attacks, the cybersecurity market is evolving its standards and protocols to ensure protection in this new digitalized world. Each October, Lattice recognizes Cybersecurity Awareness Month by hosting critical discussions on the cyber threat landscape. In our latest LinkedIn Live panel discussion, the Lattice team sat down to discuss the cybersecurity market evolution and the ...
In today’s rapidly evolving digital landscape, the importance of cyber resilience cannot be overstated. The rise of modern technology – including automation, machine learning (ML), 5G, and artificial intelligence (AI) – has provided us with a host of benefits and advancements, but it has also opened doors for increased vulnerability to cyberattacks. In fact, nearly 75% of organizations have experienced a cyberattack in the past year and, even further, the global average cost o...
There’s a complex regulatory storm on the horizon as nation-states and industry leaders announce a slew of new cybersecurity requirements. Primarily driven by three key trends: Growing vulnerability in firmware, an expanding attack surface due to 5G connectivity, and the arrival of post-quantum cryptography (PQC) – these incoming regulations will deeply impact developers. Lattice hosted its quarterly security seminar with Secure-IC and Xiphera to discuss incoming security requirement...
A new era of innovation is on the horizon amid the rise of quantum computing. This emerging technology harnesses the laws of quantum mechanics by fusing aspects of computer science, physics, and mathematics to rapidly solve problems too complex for classical computing. Google, for example, has already developed a quantum computer that operates 158 million times faster than the world’s most powerful existing supercomputer. The convergence of quantum computing with artificial intelligence (A...
5G is the fastest-growing mobile technology of all time and due to its rapid growth, we’re experiencing a major paradigm shift in in the way telecom networks are designed and implemented for addressing use cases such as robotics, connected cars, smart factories and cities, and Metaverse experiences. Lattice hosted its quarterly security seminar with ADI and NXP to discuss the challenges, opportunities, and latest hardware security solutions for the global telecommunications industry, as th...
As we continue to embrace the fast evolving technology in our daily lives, we must also recognize and mitigate the risks that come with it – particularly when it comes to keeping our information secure. Amidst these technological enhancements and challenges, there are two major trends that stand out: Post Quantum Cryptography (PQC) and cyber resilience. The rapid growth of the IoT ecosystem, fueled in part by the rise of 5G, has created a complex and highly distributed network of devices ...
Embedded World is one of the tech industry’s largest tradeshows focusing on embedded systems ranging from hardware, systems, distribution, application software, and more. We’re excited to share with you the latest Lattice innovations we had on display at the show this year. From cutting-edge hardware to sophisticated software solutions, we collaborated with our ecosystem partners to showcase demos covering a wide range of applications, including Automotive, Industrial, and Security. ...
The world has become in many ways more fragile, and a quick look into recent Supply Chain issues highlights this very well. The global growth of interdependencies and complexities of enterprises has introduced fragility into many cyber-systems. Cybersecurity has been top of mind for years across all markets and industries, but we’ve reached an inflection point. Cyberattacks have continued to grow in velocity and veracity as bad actors find new invasive ways to penetrate systems and take ad...