Debunking Three Myths about Hardware Security

Debunking Three Myths about Hardware Security

Because cyber criminals have proven over time that they are capable of circumventing the wealth of software-based security solutions intended to stop them, federal agencies need to consider taking an entirely different path: one which opts for hardware-enabled alternatives.


In doing so, they’ll embark upon what looks like the next revolution in cyber defense: Shipments for hardware supporting digital authentication and embedded security will reach 5.3 billion by 2024, doubling the number of shipments in 2019. Overall, the hardware security modules market will exceed $2 billion by 2027, up from about $828.3 million two years ago. True, traditionalist thinkers in government restrict these advancements to uses such as the safeguarding of classified networks via cross-domain solutions. They also contend that hardware is too expensive, impractical and difficult to deploy broadly as a security tool.


But they are wrong.


With state-sponsored attacks targeting a much larger range of victims than classified networks, it’s critical to come up with more formidable tactics to counter them. That’s where hardware can perform an essential role—especially once we debunk the following three myths which are holding back a widespread transformation.


Myth #1: Hardware Security is Too Niche


Reality: Yes, chip designers have deployed hardware security by baking protection features into their products, which means this form of defense has been relevant to only those who invest millions to make their own chips.


But emerging architectures using what are called field-programmable gate array, or FPGA, silicon chips are presenting a compelling case for broader adoption. FPGA chips are integrated circuits which security teams program strictly by using specific physical FPGA pins. Subsequently, the teams ..

Support the originator by clicking the read the rest link below.