Be the first to know.
Get our cybersecurity  weekly email digest.

cybersecurity

featured

Applying multi-factor authentication to connected devices is tricky, but it can and should be done, especially on the administrative side of things.

Featured

In this podcast we talk with Pim Tuyls, CEO of Intrinsic ID, about the different criteria to consider when choosing a PUF or Physical Unclonable Function and why PUFs are preferred over other approaches to get identities or cryptographic keys into chips or devices and to build a secure key vault.

Choosing a Physical Unclonable Function (PUF)

Engineers Wiki.

Most Asked Questions.

View more

ORGANIZATIONS.

SHAPING THE INDUSTRY.

Intrinsic ID

Semiconductor

Securing the IoT with the World's Top PUF Technology. Authenticate Everything.

16 Posts

THINC Lab

Artificial Intelligence

Students and faculty affiliated with the THINC lab conduct cutting-edge res...

3 Posts

AdaCore

Aerospace and Defence, Automotive, High Integrity

Build Software That Matters

NXP Semiconductors

Semiconductor industry

Brighter Together

Quest Global

Aerospace & Defense, Automotive, Energy, Hi-Tech, MedTech & Healthcare, Rail, Semi-conductor & Communications

We believe engineering has the unique opportunity to solve the problems of ...

View more

TAGGED WITH encryption

TAGGED WITH digital technology

Latest Posts

In this podcast we talk with Pim Tuyls, CEO of Intrinsic ID, about the different criteria to consider when choosing a PUF or Physical Unclonable Function and why PUFs are preferred over other approaches to get identities or cryptographic keys into chips or devices and to build a secure key vault.

Choosing a Physical Unclonable Function (PUF)