Hardware security

Semiconductor Research Corporation Announces 2024 Call for Research, $13.8M in Funding Opportunities

Retrieved on: 
Wednesday, April 10, 2024

Semiconductor Research Corporation (SRC), a premier research and workforce development consortium, is announcing the start of solicitation season with $13.8 million in funding opportunities.

Key Points: 
  • Semiconductor Research Corporation (SRC), a premier research and workforce development consortium, is announcing the start of solicitation season with $13.8 million in funding opportunities.
  • Research ideas selected for 3-year projects should align with the Microelectronics and Advanced Packaging Technologies (MAPT) Roadmap .
  • By aligning our research call to the MAPT Roadmap, we ensure that selected research proposals address topics of utmost importance to the semiconductor industry.
  • Semiconductor Research Corporation (SRC.org), a world-renowned, high technology-based consortium, serves as a crossroads of collaboration between technology companies, academia, government agencies, and SRC’s highly regarded engineers and scientists.

Sify reports Consolidated Financial Results for Q1 FY 2022-23

Retrieved on: 
Friday, July 22, 2022

Sify commissioned incremental capacity of 4MW across Noida and Hyderabad data center facilities in the quarter.

Key Points: 
  • Sify commissioned incremental capacity of 4MW across Noida and Hyderabad data center facilities in the quarter.
  • The network connectivity services crossed a critical milestone of deploying more than 5000 SDWAN service points across the country.
  • Among those who opted to migrate from on-premise DC to Sify DC were an international digital studio, a private bank and a co-operative society.
  • A domestic banking major expanded their DC and DR infrastructure with hosting in Sify DC.

Hardware Security Module Market to Reach USD 2208.3 million by 2028 at a CAGR of 10.5% | Valuates Reports

Retrieved on: 
Wednesday, May 25, 2022

The Global Hardware Security Modules market size is projected to reach USD 2208.3 million by 2028, from USD 1089 million in 2021, at a CAGR of 10.5% during 2022-2028.

Key Points: 
  • The Global Hardware Security Modules market size is projected to reach USD 2208.3 million by 2028, from USD 1089 million in 2021, at a CAGR of 10.5% during 2022-2028.
  • Furthermore, strict data security compliances are expected to increase the demand for hardware security modules, propelling the market forward.
  • The Hardware Security Module Market is expected to grow due to the increasing adoption of Hardware Security modules in the BFSI sector.
  • Specialized HSMs used in the payment card industry are known as bank hardware security modules or card payment system hardware security modules.

Hardware Security Module Market to Reach USD 2208.3 million by 2028 at a CAGR of 10.5% | Valuates Reports

Retrieved on: 
Wednesday, May 25, 2022

The Global Hardware Security Modules market size is projected to reach USD 2208.3 million by 2028, from USD 1089 million in 2021, at a CAGR of 10.5% during 2022-2028.

Key Points: 
  • The Global Hardware Security Modules market size is projected to reach USD 2208.3 million by 2028, from USD 1089 million in 2021, at a CAGR of 10.5% during 2022-2028.
  • Furthermore, strict data security compliances are expected to increase the demand for hardware security modules, propelling the market forward.
  • The Hardware Security Module Market is expected to grow due to the increasing adoption of Hardware Security modules in the BFSI sector.
  • Specialized HSMs used in the payment card industry are known as bank hardware security modules or card payment system hardware security modules.

CrossBar Announces New ReRAM Application for Hardware Security and Secure Computing

Retrieved on: 
Tuesday, July 20, 2021

While historically utilized as non-volatile semiconductor memory, CrossBar's ReRAM technology in now being introduced for use in hardware security applications utilizing its ReRAM based cryptographic PUF keys, enabling a more secure and cost-effective class of devices and systems.

Key Points: 
  • While historically utilized as non-volatile semiconductor memory, CrossBar's ReRAM technology in now being introduced for use in hardware security applications utilizing its ReRAM based cryptographic PUF keys, enabling a more secure and cost-effective class of devices and systems.
  • The ReRAM keys are unique to each individual semiconductor integrated circuit (IC), leveraging the inherent randomness characteristics of the ReRAM technology.
  • "Due to its unique stochastic and electrical characteristics, CrossBar's ReRAM PUF enables significantly more secure systems compared to incumbent PUF technologies."
  • CrossBar's new ReRAM PUF technology is enabling a new class of secure computing, addressing many of the deficiencies of alternative PUF implementations.

Intrinsic ID Wins InfoSec Award for 'Next Gen in Embedded Security' - Announced at RSA Conference by Cyber Defense Magazine

b'Sunnyvale, California--(Newsfile Corp. - May 20, 2021) - Intrinsic ID, the world\'s leading provider of Physical Unclonable Function (PUF) security IP for embedded systems, today announced it has received the Cyber Defense Global InfoSec Award 2021 for "Next Gen" in the category of Embedded Security.

Key Points: 
  • b'Sunnyvale, California--(Newsfile Corp. - May 20, 2021) - Intrinsic ID, the world\'s leading provider of Physical Unclonable Function (PUF) security IP for embedded systems, today announced it has received the Cyber Defense Global InfoSec Award 2021 for "Next Gen" in the category of Embedded Security.
  • The technology provides an additional level of hardware security utilizing the inherent uniqueness in each and every silicon chip.
  • It is used as a hardware root of trust to validate payment systems, secure connectivity, authenticate sensors, and protect sensitive government and military data and systems.
  • Intrinsic ID security has been deployed and proven in millions of devices certified by EMVCo, Visa, CC EAL6+, PSA, ioXt, and governments across the globe.\n'

Intrinsic ID's SRAM PUF Deployed by Avnet ASIC Solutions to Secure Advanced SoCs

b"Sunnyvale, California--(Newsfile Corp. - May 18, 2021) - \xc2\xa0Intrinsic ID, the world's leading provider of Physical Unclonable Function (PUF) security IP for embedded systems, today announced that Avnet ASIC Solutions (Avnet) has licensed QuiddiKey\xc2\xae to create a strong root-of-trust to secure System on Chip (SoC) for its customers.

Key Points: 
  • b"Sunnyvale, California--(Newsfile Corp. - May 18, 2021) - \xc2\xa0Intrinsic ID, the world's leading provider of Physical Unclonable Function (PUF) security IP for embedded systems, today announced that Avnet ASIC Solutions (Avnet) has licensed QuiddiKey\xc2\xae to create a strong root-of-trust to secure System on Chip (SoC) for its customers.
  • The technology provides an additional level of hardware security utilizing the inherent uniqueness in each and every silicon chip.
  • It is used as a hardware root of trust to validate payment systems, secure connectivity, authenticate sensors, and protect sensitive government and military data and systems.
  • Intrinsic ID security has been deployed and proven in millions of devices certified by EMVCo, Visa, CC EAL6+, PSA, ioXt, and governments across the globe.\n"

Bluefin and Bright Lion Partner to Provide Secure, PCI-Validated Point-to-Point Encryption (P2PE)

Retrieved on: 
Tuesday, January 12, 2021

Bright Lion will provide Bluefin's PCI-validated P2PE solution directly through the company's Zencurity platform.

Key Points: 
  • Bright Lion will provide Bluefin's PCI-validated P2PE solution directly through the company's Zencurity platform.
  • Data decryption always occurs offsite in a Bluefin hardware security module (HSM), ensuring the highest level of security.
  • It is imperative that we provide well-made, P2PE keypads from a trusted provider to enable them to meet their PCI DSS requirements," commented Matt Olenski, CEO of Bright Lion.
  • By staying ahead of the curve with security developments, Bright Lion's clients rest easy knowing they meet compliance requirements.

Anjuna and Venafi Deliver New Way to Manage Machine Identities

Retrieved on: 
Wednesday, December 9, 2020

"We are pleased to have Anjuna join Venafi's Machine Identity Management Development Fund," said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi.

Key Points: 
  • "We are pleased to have Anjuna join Venafi's Machine Identity Management Development Fund," said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi.
  • "By securing the individual application in a trusted execution environment, Anjuna gives security the freedom to rethink where and how sensitive applications using machine identities run, without rebuilding the application.
  • Data, including Venafi machine identities and the applications that leverage them, are secured by default and inaccessible to anyone or any process."
  • When security teams deploy Venafi to manage their machine identities, they often consider hardware security modules (HSMs), which are complex to deploy, especially in cloud environments.

First Cryptographic Companion Device Brings Pre-programmed Security to the Automotive Market

Retrieved on: 
Wednesday, November 11, 2020

The cryptographic companion device supports in-vehicle network security solutions such as secure boot, firmware update and message authentication, including Controller Area Network (CAN) MAC at bus speed.

Key Points: 
  • The cryptographic companion device supports in-vehicle network security solutions such as secure boot, firmware update and message authentication, including Controller Area Network (CAN) MAC at bus speed.
  • In order to comply with the new security specifications, automotive designers must rearchitect the vehicles electronic control units (ECUs) with secure hardware.
  • Existing solutions in the market include single chip dual core hardware security module (HSM) devices, which require OEMs and their module suppliers to rearchitect their application software to integrate security.
  • A full AUTOSAR reference stack is available, enabling automotive vendors to deploy the latest crypto standards into their automotive systems within standard automotive production environments.