Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 25 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

New Patent Uses Circuit Boards to Protect Cryptographic Information

by The Gurus
August 22, 2017
in Editor's News
Share on FacebookShare on Twitter

It’s everywhere. Seemingly everywhere you turn, there’s somesort of virtual attack happening. Ever since the invention of the computer hackers, have been around. But, it has only been in the last decade or so that hackers have come to the forefront of society. Today, attacks such as the WannaCry incident prove that online security is something that is of the utmost importance.
Ransomware, malware and all of the other types of attacks have become commonplace. Phishing leads to the extraction of data from users without the users even knowing that it’s happening. For security, you have to have some device that will act as a line of defense when hackers turn their targets on you.
Luckily, cyber security is a thriving industry in today’s society. From huge corporations to smaller scale operations, the security of the Internet and any online endeavors is a business with a never-ending supply of enemies. In fact, the spending on cyber security is increasing at a rapid pace. It’s an industry in which crime continues to thrive despite the advances made on the security side of things.
Although cyber security has become increasingly complex and useful, there’s always a new challenge to tackle. And one of these challenges involves the physical makeup of the circuitry boards that help provide encryption keys and codes.
The Problem
Encryption of information is vital to the security of society in an age where the Internet is everywhere. Almost everyone has some information floating around online. To combat attempts to steal this information, corporations and individuals encrypt their data.
However, one of the biggest problems with encryption is related to the circuit boards that it requires.
The circuitry and modules placed on these boards often warp them over time, and the plastic or resin doesn’t interact well with the board. Hackers can also physically manipulate the boards. IBM has a solution to this.
IBM’s Solution
To combat this issue, the tech giant developed a new printed circuit board setup. What sets IBM’s creation apart from other PCBs is that it doesn’t require plastic that wraps around the modules. Instead, IBM wrapped the modules in layers of PCB circuitry. This reduces heat and expands the life of the board. It’s a fantastic solution that combines the creative and intellectual aspects of IBM’s innovative technology.
IBM says that it will improve the manufacturing yield. This means the company can produce more PCBs, which will lead to wider availability. Since this PCB board won’t have as many parts as its predecessors, the number of repairs should decrease as well. The invention will help prevent common PCB issues and other general problems with the circuitry.
How Does This Effect Encryption?
Encryption requires a lot of skill and a mind that can work with codes and see patterns. Although it is complex, there are always people out there who want to break these encryptions and steal the information they protect. It’s a war that is ongoing.
Sometimes, they do this manually by changing the physical makeup of the board. IBM’s new PCB board will help stop this manual manipulation. The circuitry that wraps around the board where plastic usually is will act as a physical barrier. The ability to place circuitry anywhere on the board will also make it harder to tamper with.
Encryption is already a crucial part of security operations for corporations and will continue in this role well into the future. These PCB boards will make life easier for people looking to encrypt their information and make the job of the hackers more difficult.

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweet
Previous Post

Majority of FTSE 350 boards lack cyber incident training

Next Post

Fortinet Threat Landscape Report Reveals Poor Security Hygiene and Risky Applications Enable Destructive Cyberattacks to Spread Infection at Record Pace

Recent News

The Journey to Secure Access Service Edge (SASE)

The Journey to Secure Access Service Edge (SASE)

September 22, 2023
WatchGuard

WatchGuard acquires CyGlass for AI-powered network anomaly detection

September 21, 2023
'open' sign on window ledge

SME Cyber Security – Time for a New Approach?

September 21, 2023
Keeper Security Logo

Keeper Security Named a Market Leader in Privileged Access Management (PAM) by Enterprise Management Associates

September 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information