Recent reports on how side-channel attacks can be used to obtain secret information stored in Cache memories and how current processors that rely on speculative execution of code aids in these side-channel attacks have caught the attention of everyone. Names such as Spectre and Meltdown describe how a well-resourced attacker can discover secret information such as passwords and cyber keys. Since these attacks are applicable most to current processors, made by Intel, AMD and ARM; almost all computing devices (servers, desktops, laptops, cell phones) are vulnerable to such attaches. Several software and some hardware solutions have been suggested and deployed by major vendors; however, most solutions incur performance penalties. In this talk, I will provide an introduction to the architectural features that expose processors to side-channel attacks. I will present some available solutions as well some of our own ideas. I will briefly discuss other research on Cybersecurity at UNT