Lattice Blog

1024 Bob O blog

[Blog] Making Post Quantum Cryptography Real with FPGAs

Posted 10/24/2025 by Bob O’Donnell, president and chief analyst of TECHnalysis Research, LLC

One of the more exciting developments now happening in the high-tech world is the work being done to enable quantum computing. After decades of theoretical discussion and development, the last few years have shown tangible progress in this radically different (and enormously complex) new method of computing. Quantum computers essentially perform calculations by flipping the electrical charge of individual atoms and allowing them to simultaneously exist in more than one state through a process ca...

Read more...
Lattice MachXO5-NX_TDQ Blog - Graphics

[Blog] Setting the Standard: Industry First PQC-Ready FPGA

Posted 10/13/2025 by Lattice Semiconductor

Quantum computing is no longer just a concept confined to research labs. Thanks to rapid progress in both hardware and algorithms, the risk to today’s cryptographic systems is steadily increasing. In 2025, Google’s 105-qubit Willow chip and Microsoft’s Majorana 1 processor demonstrated that scalable quantum systems are moving closer to practical reality. Industry experts now predict that quantum computers capable of breaking RSA-2048 encryption could arrive as early as 2030 to ...

Read more...
Blog: Enabling Hardware Based Trust with TPM and FPGAs - Graphics

[Blog] Enabling Hardware-Based Trust with TPM and FPGAs

Posted 09/19/2025 by Mamta Gupta, AVP Strategic Business Development for Security, Telecommunications, and Datacenters, Lattice Semiconductor; Eric Sivertson, VP of Security Business, Lattice Semiconductor

Building and maintaining connected digital ecosystems that account for today’s evolving cyber threat landscape requires a degree of hardware-based trust, as software-only security approaches are no longer sufficient to protect complex, distributed systems Luckily, today’s developers can reference a foundational example of hardware-based security that has existed for decades: the Trusted Platform Module (TPM). With over four billion TPM units deployed globally across a wide range of u...

Read more...
Lattice Blog - Server Security

[Blog] Future-Proofing Server Security with Lattice FPGAs

Posted 08/29/2025 by Mamta Gupta, AVP Strategic Business Development for Security, Telecommunications, and Datacenters, Lattice Semiconductor

Servers are the backbone of modern computing infrastructure. They host sensitive data, AI models, and core workloads – making them prime targets for increasingly sophisticated cyber threats. As server architectures become more modular and disaggregated, integrating various CPUs, NICs, accelerators, SCM modules, and more, and as organizations rely more heavily on these distributed systems, the complexity of securing these systems grows exponentially. Recent attacks – such as those e...

Read more...
Q2LILive Recap Blog

[Blog] PQC & Cyber Resilience: Protecting Data in the Quantum Era

Posted 05/23/2025 by Mamta Gupta, Senior Director of Security, Datacenter and Comms Segment Marketing; Eric Sivertson, VP of Security Business

Quantum computing has long been discussed as a far-off development in computer science. The claim that widespread accessibility and use is “just five years away” is a common refrain among many practitioners. But with recent advancements in the field—including Microsoft’s Majorana 1, Google’s Willow chip, and IBM's plans to release the largest-ever quantum computer in 2025— we are closer to realizing its potential than ever before. While exciting, these advance...

Read more...
Security-Seminar-Recap-blog

[Blog] Future Cybersecurity Trends and Technologies to Watch

Posted 04/18/2025 by Mamta Gupta, Senior Director of Security, Datacenter and Comms segment marketing Eric Sivertson, VP of Security Business

Cybersecurity best practices can change on a dime. To help our customers keep up with this rapidly changing field, Lattice runs a regular Security Seminar program where security and FPGA experts dive into the latest security trends, regulations, and implementation across the Communications, Computing, Industrial, Automotive, and Consumer markets. Our goal is to deliver security-relevant insights, real signals, and a sense of what's next, especially if you're building, deploying, or managing trus...

Read more...
[Blog] Cybersecurity Solutions for the AI and Quantum Era

[Blog] Cybersecurity Solutions for the AI and Quantum Era

Posted 10/31/2024 by Eric Sivertson and Mamta Gupta

The rise of AI systems and advancing quantum computing capabilities are fundamentally reshaping the security landscape for modern organizations. While these technologies bring unprecedented capabilities, they also introduce complex security vulnerabilities that traditional cyber defense approaches struggle to address. Organizations must now position themselves to meet rising security needs, while maintaining the flexibility to address current and future threats. Recent regulatory guidelines unde...

Read more...
[Blog] Redefining the Root of Trust Architectures of Tomorrow

[Blog] Redefining the Root of Trust Architectures of Tomorrow

Posted 09/27/2024 by Lattice Semiconductor

The rapid digitalization of enterprise environments, coupled with a surge in sophisticated cyber threats, evolving security regulations, and the rise of quantum computing technology, has created a perfect storm in the cybersecurity landscape that demands heightened levels of agility and resiliency. To combat this, organizations must remain proactive in their approach to cyber defense and compliance. In the latest Lattice Security Seminar, Lattice security experts sat down with partners from AMI ...

Read more...
Lattice-Bob-O-Embedded-Security-blog

[Blog] FPGAs Make Embedded Device Security Real

Posted 08/22/2024 by Bob O’Donnell, president and chief analyst of TECHnalysis Research

When it comes to embedded devices, security has always been a big topic of interest. Unfortunately, up until now, much of the attention has been for the wrong reasons. Insecure edge computing and IoT devices have become notorious examples of how the weakest (and often overlooked) link in the chain can lead to big security breaches. Thankfully, there are now important new options for ensuring that critical features such as hardware root-of-trust, integrated cryptography, firmware resiliency and m...

Read more...
[Blog] Layering Multi-level Security from Hardware to Software

[Blog] Layering Multi-level Security from Hardware to Software

Posted 06/26/2024 by Lattice Semiconductor

In the ever-evolving landscape of cybersecurity, this year’s Global Cybersecurity Outlook from the World Economic Forum provides crucial insights into the multifaceted challenges facing leaders across the globe. Geopolitical instability, rapidly advancing technologies, and an increasing gap in organizational cyber capabilities reinforce the need to build resilience and enable systemic global collaboration. As threats like sophisticated ransomware, firmware attacks, and the expanded use of...

Read more...
View more