top of page
Proactive Protection: Cybersecurity of the Future
Comments: By any measure, the security market is massive, and cyber-attacks spur demand for security software. Costs of cybercrime damage are slated to reach $6 trillion by 2021 annually. The CPU protecting cybersecurity will form a wave of several major, long-term security and security-required R&D and business trends to:
1) reduce or eliminate protection expenses due to the built-in nature of the proactive protections; and
2) mitigate computing and networking time and cost overheads by reducing or removing trends of the existing security software updating and network monitoring overheads.
We expect that further R&D will immunize any type of processor (e.g., CPU, AP, DSP, NPU, MCU, etc.) for any computer, smart-connected device, embedded system, IoTs, etc., which are secured with security software or not even protected.
Comments: Billions of IoTs and embedded systems (e.g., autonomous/electric vehicles, flying objects, smart-home/security systems, autonomous farming equipment, biometric cybersecurity scanners, ultra-high-speed wireless internet, wearable health monitors, smart factory equipment, etc.) have been using and will continuously introduced in the future. The IoTs and embedded systems employ microcontrollers (MCUs) and/or other types of processors (i.e., embedded processor, DSP, ASIP, media processor, etc.). Almost all of them are connected via communication networks, which also make any connected IoT/embedded system vulnerable. In particular, MCUs or processors (e.g., CPU/AP/etc.) connected to 5G networks (e.g., 10Gbps speed) face impossible or significantly limited to run security software. To resolve these issues, cybersecurity of IoTs and embedded systems on ultra-high speed networks must be performed on the CPU level. Thus, CPU protection will not be an optional, but mandatory.
Comments: One of the important functions of artificial intelligence (AI) is "the future of all complex decision making" based on massive data processing, including data absorption and interpretation. Thus, the AI operations must be used correct or authorized data. AI also highly requires learning from trusted data. The CPU protecting-based cybersecurity forbids an AI machine utilizing malicious data provided by hackers so that the AI machine cannot be evolved according to intentions of unauthorized devices or persons.
Comments: Recent news articles from IBM reported that "hackers attacked COVID-19 vaccine companies!” These attempts are simply not right and must be prevented because time, efforts, and financial resources of numerous researchers, volunteers, and taxpayers including government officials must be protected to achieve their common goals for humanities. Although an immunized CPU will be tiny semiconductors in a ceramic package, it will proactively prevent hackers or their organizations from hacking invaluable vaccine information for our global community.
bottom of page