searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Xilinx

Get our top stories in your inbox

Samsung delivers PIM technology to a wider range of applications

August 25, 2021

Samsung showcased its latest advancements with processing-in-memory (PIM) technology at Hot Chips 33 — a semiconductor conference where the most notable microprocessor and IC …

Siemens unveils Veloce, a hardware-assisted verification system

March 29, 2021

Siemens unveiled its next-generation Veloce hardware-assisted verification system for the rapid verification of highly sophisticated, next-generation integrated circuit (IC) …

Starbleed vulnerability: Attackers can gain control over FPGAs

April 20, 2020

Field Programmable Gate Arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. Starbleed …

Wind River and Xilinx develop new platform for automated driving apps

November 13, 2019

Wind River, a leader in delivering software for the intelligent edge, announced a collaboration with Xilinx on the development of a comprehensive automated driving platform …

Xilinx acquires Solarflare enabling new converged SmartNIC solutions

April 26, 2019

Xilinx, the leader in adaptive and intelligent computing, announced that it has entered into a definitive agreement to acquire Solarflare Communications, an Irvine, …

AWS makes new Amazon EC2 instances available to process large amounts of data

July 26, 2018

Amazon Web Services announced general availability of a new high frequency instance (z1d) for Amazon Elastic Compute Cloud (Amazon EC2), as well as the memory optimized …

Featured news

  • Exploring the insecurity of readily available Wi-Fi networks
  • Python packages with malicious code expose secret AWS credentials
  • OT security: Helping under-resourced critical infrastructure organizations
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Trends to watch when creating security strategy for the next two years

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Exploring the insecurity of readily available Wi-Fi networks

Threat actors increasingly use third parties to run their scams

Don't miss

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Trends to watch when creating security strategy for the next two years

Python packages with malicious code expose secret AWS credentials

OT security: Helping under-resourced critical infrastructure organizations

How phishing attacks are becoming more sophisticated

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise