Our digital world is undergoing a profound transformation. Cloud computing, artificial intelligence (AI) and machine learning (ML) workloads, as well as the emergence of quantum computing capabilities, are reshaping how networks must be protected and secured. What’s more, these changes come amid evolving risks & regulations – from the prevalence of “harvest now; decrypt later” attacks, to updated standards like the Commercial National Security Algorithm Suite (CNSA) 2...
Each year, the Open Compute Project (OCP) Global Summit brings together the tech industry’s most innovative thinkers to discuss the current and future state of open hardware and software solutions. This year, Lattice and our ecosystem partners had the opportunity to showcase a range of our Field Programmable Gate Array (FPGA)-based solutions that help enable OCP-compliant development of datacenters, artificial intelligence (AI) solutions, and more. In case you missed the show, here’...
One of the more exciting developments now happening in the high-tech world is the work being done to enable quantum computing. After decades of theoretical discussion and development, the last few years have shown tangible progress in this radically different (and enormously complex) new method of computing. Quantum computers essentially perform calculations by flipping the electrical charge of individual atoms and allowing them to simultaneously exist in more than one state through a process ca...
Quantum computing is no longer just a concept confined to research labs. Thanks to rapid progress in both hardware and algorithms, the risk to today’s cryptographic systems is steadily increasing. In 2025, Google’s 105-qubit Willow chip and Microsoft’s Majorana 1 processor demonstrated that scalable quantum systems are moving closer to practical reality. Industry experts now predict that quantum computers capable of breaking RSA-2048 encryption could arrive as early as 2030 to ...
Building and maintaining connected digital ecosystems that account for today’s evolving cyber threat landscape requires a degree of hardware-based trust, as software-only security approaches are no longer sufficient to protect complex, distributed systems Luckily, today’s developers can reference a foundational example of hardware-based security that has existed for decades: the Trusted Platform Module (TPM). With over four billion TPM units deployed globally across a wide range of u...
Servers are the backbone of modern computing infrastructure. They host sensitive data, AI models, and core workloads – making them prime targets for increasingly sophisticated cyber threats. As server architectures become more modular and disaggregated, integrating various CPUs, NICs, accelerators, SCM modules, and more, and as organizations rely more heavily on these distributed systems, the complexity of securing these systems grows exponentially. Recent attacks – such as those e...
Quantum computing has long been discussed as a far-off development in computer science. The claim that widespread accessibility and use is “just five years away” is a common refrain among many practitioners. But with recent advancements in the field—including Microsoft’s Majorana 1, Google’s Willow chip, and IBM's plans to release the largest-ever quantum computer in 2025— we are closer to realizing its potential than ever before. While exciting, these advance...
Cybersecurity best practices can change on a dime. To help our customers keep up with this rapidly changing field, Lattice runs a regular Security Seminar program where security and FPGA experts dive into the latest security trends, regulations, and implementation across the Communications, Computing, Industrial, Automotive, and Consumer markets. Our goal is to deliver security-relevant insights, real signals, and a sense of what's next, especially if you're building, deploying, or managing trus...
The rise of AI systems and advancing quantum computing capabilities are fundamentally reshaping the security landscape for modern organizations. While these technologies bring unprecedented capabilities, they also introduce complex security vulnerabilities that traditional cyber defense approaches struggle to address. Organizations must now position themselves to meet rising security needs, while maintaining the flexibility to address current and future threats. Recent regulatory guidelines unde...
The rapid digitalization of enterprise environments, coupled with a surge in sophisticated cyber threats, evolving security regulations, and the rise of quantum computing technology, has created a perfect storm in the cybersecurity landscape that demands heightened levels of agility and resiliency. To combat this, organizations must remain proactive in their approach to cyber defense and compliance. In the latest Lattice Security Seminar, Lattice security experts sat down with partners from AMI ...