Syndicated Blog

Cycuity
Security assurance starts here.

Cycuity Achieves ISO/SAE 21434 Certification for Automotive Cybersecurity Compliance

Affirms Cycuity’s hardware security verification solution and engineering processes comply with cybersecurity standard for road vehicles SAN JOSE, Calif. — July 11, 2023 — Cycuity, Inc., an innovator of semiconductor security solutions, ...

Accelerating the DoD’s Access to Commercial Microelectronic Design Security Technology

We recently announced our $99M IDIQ contract from the Department of Defense (DoD) to drive proliferation of our Radix technology and expand its capabilities for increased assurance of microelectronic devices. The contract ...

Cycuity Awarded Seven-Year $99 Million IDIQ Contract To Address Design Supply Chain Security

First phase to address secure design supply chain and third-party IP security in close collaboration with partners in the defense and commercial sectors SAN JOSE, Calif. – June 14, 2023  –  Cycuity, ...

Enhancing Automotive Security with MITRE CWE

The cybersecurity of the electronics used in automotive designs is crucial and must be considered very early during the architecture and design phase of development. An important set of guideposts for this ...
Getting Ahead of the Curve with Automotive Security Compliance

Getting Ahead of the Curve with Automotive Security Compliance

In the ever-evolving world of smart cars, cybersecurity has emerged as a major priority in the automotive industry. Automotive manufacturers are facing a market that demands smart cars meet more stringent automotive ...
Using these elements, you can create requirements that address the specific security objectives (e.g., confidentiality or integrity) you have for your product.

Creating Comprehensive and Verifiable Hardware Security Requirements

| | Blog
Developing effective hardware security requirements is one of the trickiest aspects of building trustworthy electronic products. Even highly skilled and experienced teams don’t always get it right. Why? First, it’s very difficult ...
Identifying Security Issues Early Reduces Cost and Risk

A Security Maturity Model for Hardware Development

| | Blog
With systems only growing more sophisticated, the potential for new semiconductor vulnerabilities continues to rise. Consumers and hardware partners are counting on organizations meeting their due diligence obligations to ensure security sensitive ...
Security Verification of an Open Source Hardware Root of Trust

Security Verification of an Open Source Hardware Root of Trust

Dominic Rizzo (OpenTitan) and Jason Oberg (Cycuity) OpenTitan is a powerful open source silicon root of trust project, designed from scratch as a transparent, trustworthy and secure implementation for enterprises, platform providers ...
Cybernews Feature: Andreas Kuehlmann, Cycuity CEO

Cybernews Feature: Andreas Kuehlmann, Cycuity CEO

| | press
Featured on Cybernews Software often seems like the most important thing that makes the digital world go round, but we often forget that hardware is also in the picture. And as we ...
™

Tortuga Logic Rebrands as Cycuity

| | press, SBN News
Addressing Evolving Needs in Product Security SAN JOSE, Calif. — June 22, 2022 — Tortuga Logic has officially changed its name to Cycuity, introducing a brand identity that marks a new phase ...

Secure Guardrails