close By using this website, you agree to the use of cookies. Detailed information on the use of cookies on this website can be obtained on OneSpin's Privacy Policy. At this point you may also object to the use of cookies and adjust the browser settings accordingly.

All-In-One Vs. Point Tools For Security

By: Bryon Moyer

Security remains an urgent concern for builders of any system that might tempt attackers, but designers find themselves faced with a bewildering array of security options.

“We’re still in the dark ages, trying to catch up to an adversary that seemingly is always coming up with a new and better approach to break into a system long before we’ve even thought about being able to check on it,” said John Hallman, product manager for trust and security at OneSpin Solutions. “We need to understand what are the characteristics that would jump this race back closer into the realm where we might be able to better attack the attacker.”

[..]

“We’re getting requests a lot of requests as we move toward autonomous cars,” said OneSpin’s Hallman. “There are a lot of concerns about what can go into ICs, what can be verified in the ICs, and how well it can be verified. There are a lot of checks that need to be in place.”

Back

Related Links