Back to home
Technology

2026 Outlook with Richard Hegberg of Caspia Technologies

Source

SemiWiki

Published

TL;DR

AI Generated

Rick Hegberg, CEO of Caspia Technologies, discusses the company's mission to enhance hardware security through a ground-up chip design approach. In 2025, Caspia introduced CODAx, a tool for early security analysis in chip designs. The main challenge faced was educating the industry on the importance of hardware security. Caspia's products, including CODAx, SVx, and PFx, aim to simplify security adoption in chip design. The company anticipates significant growth in 2026 as the semiconductor industry prioritizes security, with plans to deploy their products widely and collaborate with industry leaders.

Read Full Article

Similar Articles

Crucial Taiwan undersea cable severed by old shipwreck — backup microwave communications activated to keep population connected

Crucial Taiwan undersea cable severed by old shipwreck — backup microwave communications activated to keep population connected

A shipwreck off Dongyin island in Taiwan has severed the undersea cable connecting it to Beigan Island, prompting the activation of backup microwave communications to maintain connectivity for the 1,500 residents. The Matsu Islands' strategic location near mainland China and the Taiwan Strait makes them crucial for Taiwan's military presence. While this incident was due to natural causes, it underscores Taiwan's vulnerability in its global connections. Recent suspicions of deliberate undersea cable damage by Chinese ships have led Taiwan to increase defensive measures and penalties for sabotage attempts. Despite wireless backups, physical undersea cables remain essential for reliable and high-bandwidth internet connections.

Tom's Hardware
With $1 Cyberattacks on the Rise, Durable Defenses Pay Off

With $1 Cyberattacks on the Rise, Durable Defenses Pay Off

As cyberattacks that cost as little as $1 become more prevalent, the importance of robust cybersecurity defenses is highlighted. The article emphasizes the significance of writing memory-safe code over relying solely on patching vulnerabilities. Experts Evan Johnson and Justin Cappos from New York University stress the need for durable defenses in the face of rapid and powerful cyberattacks facilitated by large language models like Anthropic’s Claude Mythos. They suggest that a comprehensive approach beyond generative AI is essential for effective cyberdefense.

IEEE Spectrum
US stops exports of tools to China’s number two chip maker — Hua Hong and Huali Microelectronics reportedly on the cusp of starting a 7-nm fab in Shanghai

US stops exports of tools to China’s number two chip maker — Hua Hong and Huali Microelectronics reportedly on the cusp of starting a 7-nm fab in Shanghai

The US Department of Commerce has instructed toolmakers to cease exports to Hua Hong, China's second-largest chipmaker, which is gearing up to establish a 7-nm production line in Shanghai. This move is part of the US strategy to impede China's semiconductor self-sufficiency efforts. Companies like TSMC and ASML have also faced restrictions in providing advanced services to Chinese tech firms. The ban on exports could strain US-China relations, impacting both Chinese companies' progress and potential losses for American toolmakers.

Tom's Hardware
Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Security firm Checkmarx has been targeted in a series of supply-chain attacks over the past six weeks, with malware being pushed to customers through compromised accounts. The attacks began with the breach of the Trivy vulnerability scanner, leading to malware being distributed to Checkmarx users. Checkmarx's GitHub account was also compromised, leading to the dissemination of malware to its users. The company faced additional malware pushes, indicating ongoing security challenges. A ransomware group known as Lapsu$ recently dumped Checkmarx's private data on the dark web, suggesting persistent access by attackers.

Ars Technica

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.