CONNECT WITH US
Thursday 2 October 2025
SK Group partners with OpenAI to advance global AI infrastructure
Seoul, October 1, 2025 - SK Group announced today that SK Chairman Chey Tae-won and OpenAI CEO Sam Altman met at SK headquarters in Seoul to sign a Letter of Intent (LOI) and a Memorandum of Understanding (MOU) to develop an AI Data Center in South Korea as part of the Stargate project
Hardware Security
Hardware security is crucial for providing robust protection for sensitive data in our increasingly interconnected environment. Relying solely on software protection is insufficient to prevent the rising threats of remote cyberattacks.
Wednesday 24 September 2025
GUC Launches Next - Generation 2.5D/3D APT Platform Leveraging TSMC's Latest 3DFabric and Advanced Process Technologies
Global Unichip Corp. (GUC), theAdvanced ASIC Leader, today announced the launch of its next-generation 2.5D/3D Advanced Package Technology (APT) platform, developed to accelerate designcycles and reduce risk for high-performance, high-yield ASICs. The platform integrates TSMC's latest 3DFabric technologies and advanced process nodes, enable next-generation designs with a comprehensive solution that spans from silicon-proven IP to 2.5D/3D packaging.The new platform builds on GUC's first-generation 2.5D/3D APT platform introduced in 2022. Since then, GUC has closely collaborated with TSMC to incorporate major technological advancements of TSMC in both logic processes and 3DFabric technologies. TSMC's evolution from FinFET-based N5/N3 nodes to next-generation nanosheet nodes-N2 and A16-has enabled unprecedentedintegration density and performance scaling. Simultaneously, TSMC's 3DFabric innovations, including CoWoS, TSMC-SoIC , and System-on-Wafer (TSMCSoWTM), allow for advanced 2.5D/3D integration of multiple dies across larger package substrates.Industry standards have also evolved. The latest HBM4 memory interface doubles I/O to 2,048 pins, unlocking significantly higher bandwidth. Meanwhile, the UCIe die-to-die interface has gained industry-wide adoption, advancing from 16Gbps to 24Gbps and now 32Gbps-and beyond.GUC Milestones and Technology HighlightsUCIe Die-to-Die IP: GUC offers UCIe-A 32G/36G IP in TSMC N3 and N5 processes, with a 64G version under development and scheduled for tape-out in late 2025. The UCIe-A IP in TSMC 2nm technology is also planned for 2026.Integration with TSMC SoIC-X: GUC successfully taped out UCIe Face-Up IP in TSMC N5 using TSVs for bottom die applications-enabling vertical die stacking in future nodes.HBM4 IP: GUC taped out its HBM4 PHY IP on TSMC N3P, achieving 12Gbps speeds. The IP supports CoWoS-L/R and SoW platforms, with porting to TSMC N2P underway for a 2026 tape-out.GLink/UCIe-3D IP: Building on its GLink-3D 1.0 success, GUC now offers UCIe/GLink-3D 2.0 IP delivering 50 Tbps/mm? bandwidth, architecture proven via TSMC N2P. A customized version has already been taped out by a lead customer for an N3 over N5 ASIC.Deep Collaboration with TSMCGUC has long worked with TSMC closely to develop silicon-proven IP and platform technologies. This ongoing collaboration ensures alignment with TSMC's latest process and 3DFabric packaging advances, enabling customers to reduce design risk while accelerating time-to-market."TSMC has been working closely with our Open Innovation Platform (OIP) partners like GUC to develop IP solutions for our advanced process and 3DFabric technologies," said Aveek Sarkar, Director of Ecosystem and Alliance Management Division at TSMC. "Our latest collaboration with GUC in enabling its 2.5D/3D platform will help customers accelerate product development cycles and deliver next-generation silicon using our advanced packaging and process technologies.""We were industry-leading with HBM3 PHY and Controller, and again with HBM4 in 2025," said Aditya Raina, CMO of GUC. "Our UCIe IP has demonstrated unmatched 32Gbps speed and is now moving to 64Gbps era. Our Custom GLink-3D 2.0 IP has achieved 40 Tbps/mm² through a lead customer. These achievements mark the dawn of true 3D ASICs."GUC's next-generation APT platform combines cutting-edge IP, TSMC-certified design flows, and high-volume production experience to enable rapid, low-risk development of next-generation AI, HPC, and networking chips.To learn more about GUC's solutions, please contact GUC sales representative via email.
Wednesday 24 September 2025
Wise Integration Appoints Ghislain Kaiser, Successful High-Tech Entrepreneur & Former Intel Executive, as CEO to Lead Global Growth
Wise Integration, a pioneer in digital control for gallium nitride]GaN^and GaN IC-based power supplies, today announced the appointment of Ghislain Kaiser as Chief Executive Officer. Kaiser succeeds CEO and co-founder, Thierry Bouchet, who will continue to serve as Chief Technology Officer and General Manager, leading the worldwide R&D and driving the technological vision.A seasoned high-tech leader with a proven track record in growing and leading global teams in the semiconductor industry, Kaiser brings deep experience in scaling deep-tech ventures. In 2006, he cofounded Docea Power, a French EDA startup pioneering full-chip, system-level power and thermal modelling, with the vision of addressing the growing power-consumption and thermal challenges in IC and platform design.As CEO, he led the company to domain leadership and its acquisition by Intel in 2015. He then joined Intel, where for the next decade he held senior director roles, most recently overseeing system-simulation engineering and worldwide customer-enablement organization. Those programs tackled the most critical power, thermal, and performance challenges in designing consumer, data-center, and AI systems. Kaiser began his career at STMicroelectronics, where he held technical and leadership positions across test and product engineering, design, and architecture teams.Targeting Fast-Growing MarketsWith Kaiser’s appointment, Wise Integration is positioning itself to scale globally and capitalize on booming markets such as data centers powering artificial intelligence (AI), and electric vehicles (EV)-which demand more efficient, compact, and digitally controlled power architectures."I'm thrilled to join Wise Integration and build on its success in providing customers differentiated solutions in power electronics to meet their biggest challenges," Kaiser said. "This talented team has created an R&D-driven culture and a robust foundation to lead the GaN power electronics transformation globally."The Next Chapter"On behalf of the board of directors, I am pleased to welcome Ghislain Kaiser as Wise Integration's new CEO, and to compliment the team for their exceptional work," said Board Chairman Patrick Boulaud. "This marks a major milestone for the company as it transitions from a CEAHLeti spinout into a pioneering force in GaN and digital power management innovation with strong growth potential. Ghislain's background makes him a natural choice as the CEO to guide the company through this next stage of growth.""Ghislain's arrival begins a new chapter for Wise Integration," Bouchet added. "With our WiseGan devices and WiseWare digital control, we've built a strong foundation in consumer markets. Now it's time to scale our innovations and tackle the next big challenges-bringing unmatched efficiency and power density to AI servers, data centers, and tomorrow's automotive systems."Selected Highlights (2020–2025)Spun out from CEA-Leti in 2020 using the institute's GaN-on-silicon R&D platform. Developed proprietary WiseGan IC and WiseWare microcontroller. Launched its fully digital controller, WiseWare 1.1. Opened a design center in Canada and established an Asian subsidiary in Hong Kong.Wise Integration Appoints Ghislain Kaiser, Successful High-Tech Entrepreneur & Former Intel Executive, as CEO to Lead Global Growth.WISE
Tuesday 23 September 2025
Quantum resilience: Quantum cryptography will protect the future of the global network equipment supply chain
The modern digital supply chain is no longer a traditional linear sequence but a complex, interconnected ecosystem of suppliers, sellers, logistics providers, and customers. While digital transformation greatly improves efficiency, it also exponentially expands the overall attack surface. In this model, risks are no longer isolated but systemic and cascading. Supply chain efficiency is built on an implicit digital trust model between partners, which is manifested through application programming interfaces (APIs), shared portals, and integrated software. However, this trust structure, built in pursuit of efficiency, has become a primary attack vector. Cybercriminals are no longer just breaking through firewalls—they are exploiting the fundamental fabric of digital collaboration. As a result, the traditional perimeter defense model is outdated; The new perimeter of defense is the entire supply chain ecosystem, and its security must be built on a zero-trust model enforced with cryptography.Third-party or fourth-party vulnerabilitiesAttackers often use the weakest link in the chain—often smaller, poorly secured vendors—as a springboard to infiltrate the network of their ultimate high-value target. This highlights a stark reality: an organization's security posture is only as strong as its least secure partners. This risk stems from the pursuit of supply chain efficiency, as the smooth operation of business processes requires granting partners a considerable degree of access. This expansion of access rights, without corresponding strict security controls, constitutes a systemic vulnerability based on excessive trust.The fundamental role of traditional cryptography and its limitationsCurrent supply chain security relies heavily on traditional public key cryptography (such as RSA, ECC) to protect data in transit and at rest. Mitigation strategies such as data encryption (using AES), risk assessment, and incident response plans are crucial, but their effectiveness is built on the strength of these underlying cryptographic algorithms. While these methods are still effective against today's threats, the entire security foundation is fragile and faces an existential threat that will be the focus of the next section.Quantum Horizons: A Paradigm Shift in Cryptographic ThreatsQuantum computers use quantum mechanical principles such as superposition and entanglement to solve mathematical problems (e.g., integer factorization, discrete logarithms) that form the security basis of today's public key cryptography (RSA, ECC, Diffie-Hellman). This is not a purely theoretical deduction, but a major engineering challenge that is making rapid progress. Once a quantum computer with sufficient scale and stability comes out, the current encryption system that protects global digital communications will fail in an instant."Get First, Decrypt Later" (HNDL): An imminent dangerThe Harvest Now, Decrypt Later (HNDL) attack transforms the quantum threat from a futuristic problem to a present reality. The mechanism is that attackers, especially state-state actors, are actively intercepting and storing large amounts of today's encrypted data. These attacks target information with long-term value, such as intellectual property, government secrets, financial records, medical data, and personally identifiable information (PII).This means that by the time a "Cryptographically Relevant Quantum Computer" (CRQC) appears that can crack current encryption algorithms (known as "Q-Day", which is expected to arrive as early as 2035), these obtained data will be retroactively deciphered. Therefore, the security of any sensitive data transmitted today that requires long-term confidentiality is already at risk.This attack pattern transforms a company's data retention policy into a huge potential security liability. Regulations such as the Health Insurance Portability and Accountability Act (HIPAA) or the General Data Protection Regulation (GDPR) often require organizations to retain data for an extended period. The HNDL attack vector turns this legal compliance requirement into a potential ticking time bomb. Organizations are legally required to encrypt data stored for years, making it an ideal target for HNDL attacks. This creates a direct conflict between compliance and security: the act of adhering to data retention regulations inadvertently creates vulnerabilities for future quantum decryption threats. Therefore, risk management and legal teams must be immediately involved in the migration strategy of post-quantum cryptography. This is no longer just an IT issue, but a simmering corporate governance and compliance crisis.To learn the latest cybersecurity regulations and trends, download the hardware security whitepaper for free.Post-Quantum Cryptography (PQC): Laying the foundation for quantum resilienceDefinition of post-quantum cryptographyPost-quantum cryptography (PQC) refers to traditional algorithms that are designed to run on today's classical computers but are resistant to attacks from both classical and quantum computers. This distinguishes PQC from quantum cryptography, which requires specialized hardware, such as quantum key distribution, or QKD. PQC's goal is to develop a new generation of public-key cryptographic systems based on mathematical problems that are equally difficult for quantum computers.NIST PQC Standardized Process: A globally recognized markThe National Institute of Standards and Technology (NIST) has led a multi-year, transparent, and collaborative global process to select and standardize the next generation of public key algorithms. This process is crucial in building trust in the new standard. The process began in 2016 with a public call for proposals, receiving 82 proposals from 25 countries and undergoing multiple rounds of rigorous public review and analysis in the global cryptography community.The finalization of NIST standards is the starting gun that triggers a massive technology update cycle across the tech industry. This was not only an academic milestone but also a turning point in business and logistics. It directly prompted government agencies such as CISA and the National Security Agency (NSA) to issue migration directives, which in turn pushed major software vendors and hardware manufacturers such as Microsoft and Google to integrate these specific algorithms into their products. This ripple effect ultimately extends to enterprises, who must plan their migrations to maintain compatibility and security. NIST standards are the core domino that initiates PQC adoption worldwide.Secure the edge: Protect IoT and operational technology equipment in the supply chainInternet of Things (IoT) and operational technology (OT) devices face the biggest challenges in PQC migration for the following reasons:*Long life cycle: The device may be used in the field for 10-20 years without replacement.*Limited resources: Limited processing power, memory, and energy budgets.*Lack of Updability: Many devices are not designed to be conducive to easy firmware or cryptography updates.The application of PQC in these areas will be gradual and there will be significant differences between the old and new systems. For "greenfield" systems, such as new IoT product lines, PQC can be integrated from the outset. For "brownfield" systems, such as existing factory OT equipment, the challenge is enormous, often requiring the entire hardware to be replaced. This means that the PQC migration of the supply chain will be a two-speed process. Businesses must prioritize the adoption of PQC in new systems while developing long-term, potentially costly, retirement or retrofit capital plans for existing assets that are not quantum-safe.Use cases for PQC include:*Industrial automation: Protecting communication between sensors, controllers, and management systems in factories and processing plants.*Smart Infrastructure and Logistics: Protecting smart grid equipment, traffic control systems, and connected logistics sensors.*Automotive V2X Communication: Secure vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to ensure security and prevent malicious manipulation.*Healthcare Supply Chain: Ensuring the integrity and privacy of data from connected medical devices.Conclusion and recommendationsWinbond's W77Q Secure Flash Memory is a robust solution to address the PQC threats mentioned above. Key PQC-Safe features of the W77Q Secure Flash include:*Platform Resilience: In accordance with NIST 800-193 recommendations, the system automatically detects unauthorized program changes and can automatically restore to a secure state to avoid potential cyberattacks. *Security Software Update and Fallback Protection: Supports remote security software updates while preventing fallback attacks, ensuring that only legitimate updates can be executed. To maintain the highest level of security and integrity, the W77Q adopts the quantum-secure Leighton-Micali signature (LMS) algorithm recommended by NIST Special Publication 800-208 to ensure the authenticity and integrity of updated software, providing additional security*Secure Supply Chain: Secure Flash ensures the origin and integrity of flash content at every stage of the supply chain. The W77Q implements LMS-OTS-based remote authentication (NIST 800-208). This advanced method effectively prevents content tampering and misconfiguration during assembly, transportation, and configuration, protecting the platform from cyberattacks.Winbond's secure flash solutions help system manufacturers meet industry regulatory compliance requirements, improve platform security, and improve supply chain information and communication security during production, shipping, and construction and operation.To learn more about Winbond's advanced security solutions, visit Winbond's website or contact Winbond directly, or download the latest Hardware Security White Paper.To learn the latest cybersecurity regulations and trends, download the hardware security whitepaper for free.