The transition to post-quantum cryptography (PQC) is not a theoretical future event. It is the largest cryptographic migration in modern history, already shaping product roadmaps, standards bodies, and infrastructure planning across servers, AI datacenters, telecom, industrial automation, and critical systems. In this interview, we sat down with Mamta Gupta, a leader driving Lattice’s quantum-safe security strategy, to discuss Quantum Day (Q-Day) readiness, crypto-agility, Security Proto...
Our digital world is undergoing a profound transformation. Cloud computing, artificial intelligence (AI) and machine learning (ML) workloads, as well as the emergence of quantum computing capabilities, are reshaping how networks must be protected and secured. What’s more, these changes come amid evolving risks & regulations – from the prevalence of “harvest now; decrypt later” attacks, to updated standards like the Commercial National Security Algorithm Suite (CNSA) 2...
Each year, the Open Compute Project (OCP) Global Summit brings together the tech industry’s most innovative thinkers to discuss the current and future state of open hardware and software solutions. This year, Lattice and our ecosystem partners had the opportunity to showcase a range of our Field Programmable Gate Array (FPGA)-based solutions that help enable OCP-compliant development of datacenters, artificial intelligence (AI) solutions, and more. In case you missed the show, here’...
One of the more exciting developments now happening in the high-tech world is the work being done to enable quantum computing. After decades of theoretical discussion and development, the last few years have shown tangible progress in this radically different (and enormously complex) new method of computing. Quantum computers essentially perform calculations by flipping the electrical charge of individual atoms and allowing them to simultaneously exist in more than one state through a process ca...
Quantum computing is no longer just a concept confined to research labs. Thanks to rapid progress in both hardware and algorithms, the risk to today’s cryptographic systems is steadily increasing. In 2025, Google’s 105-qubit Willow chip and Microsoft’s Majorana 1 processor demonstrated that scalable quantum systems are moving closer to practical reality. Industry experts now predict that quantum computers capable of breaking RSA-2048 encryption could arrive as early as 2030 to ...
Building and maintaining connected digital ecosystems that account for today’s evolving cyber threat landscape requires a degree of hardware-based trust, as software-only security approaches are no longer sufficient to protect complex, distributed systems Luckily, today’s developers can reference a foundational example of hardware-based security that has existed for decades: the Trusted Platform Module (TPM). With over four billion TPM units deployed globally across a wide range of u...
Servers are the backbone of modern computing infrastructure. They host sensitive data, AI models, and core workloads – making them prime targets for increasingly sophisticated cyber threats. As server architectures become more modular and disaggregated, integrating various CPUs, NICs, accelerators, SCM modules, and more, and as organizations rely more heavily on these distributed systems, the complexity of securing these systems grows exponentially. Recent attacks – such as those e...
Recent advancements in quantum computing have made post-quantum cryptography (PQC) more necessary than ever before. There is an immediate need for developers across industries to strengthen their computing ecosystem against the heightened risk and uncertain capabilities of quantum-enabled attacks. The challenge? There’s not yet a standard, comprehensive model for ensuring post-quantum security. Traditionally, developers have been able to create standards and best practices in response to ...
Cybersecurity best practices can change on a dime. To help our customers keep up with this rapidly changing field, Lattice runs a regular Security Seminar program where security and FPGA experts dive into the latest security trends, regulations, and implementation across the Communications, Computing, Industrial, Automotive, and Consumer markets. Our goal is to deliver security-relevant insights, real signals, and a sense of what's next, especially if you're building, deploying, or managing trus...
Embedded World is one of the biggest tradeshows in the world, at which Lattice and our ecosystem partners showcase the latest and greatest Lattice FPGA based innovation in a wide range of applications for Automotive, Industrial, and Security applications at the Edge. In case you missed the show, following is a snapshot of our highlights from embedded world 2025. Lattice Wins Embedded Computing Design (ECD) ‘Best in Show’ Award Lattice won the prestigious ECD Best in Show award...
The rise of AI systems and advancing quantum computing capabilities are fundamentally reshaping the security landscape for modern organizations. While these technologies bring unprecedented capabilities, they also introduce complex security vulnerabilities that traditional cyber defense approaches struggle to address. Organizations must now position themselves to meet rising security needs, while maintaining the flexibility to address current and future threats. Recent regulatory guidelines unde...
The rapid digitalization of enterprise environments, coupled with a surge in sophisticated cyber threats, evolving security regulations, and the rise of quantum computing technology, has created a perfect storm in the cybersecurity landscape that demands heightened levels of agility and resiliency. To combat this, organizations must remain proactive in their approach to cyber defense and compliance. In the latest Lattice Security Seminar, Lattice security experts sat down with partners from AMI ...
On August 13, 2024, the US National Institute of Standards and Technology (NIST) released the eagerly awaited Post-Quantum Cryptography (PQC) standards. These standards introduce three new encryption algorithms designed to secure systems against both classical and future quantum computer attacks, providing a necessary evolution from RSA and ECC asymmetric encryption algorithms. In this blog, we outline the impact of these standards and the essential steps for system designers to transition to PQ...
Field programmable gate arrays (FPGAs) play an important role in a multitude of today’s technology. From aerospace and defense to consumer electronics to critical infrastructure and the automotive industry, the prevalence of FPGAs in our lives is growing. Also growing are the threats to those FPGAs. The resources spent to create the IP (Intellectual Property) that runs (firmware) inside FPGAs are vast, as is the technology protected by these FPGAs. This makes FPGAs a potential target for ...
A new era of innovation is on the horizon amid the rise of quantum computing. This emerging technology harnesses the laws of quantum mechanics by fusing aspects of computer science, physics, and mathematics to rapidly solve problems too complex for classical computing. Google, for example, has already developed a quantum computer that operates 158 million times faster than the world’s most powerful existing supercomputer. The convergence of quantum computing with artificial intelligence (A...