Date Published: September, 27, 2016
Even as enterprises make progress on securing traditional IT networks, the OT, or operational technology, side of networks remain surprisingly vulnerable. Why? In the IT world, administrators regularly patch, use more current versions of hardware and soft… READ MOREDate Published: September, 20, 2016
by Jun Takei, Intel Corporation 日本の情報セキュリティに多大なる貢献をされてきた奈良先端科学技術大学院大学の山口英先生が2016年5月9日に急逝されました。 先生のいままでの功績は多くの… READ MOREDate Published: September, 15, 2016
In the world of cybersecurity, there certainly seems to be lots of work to do - each day brings new breaches, attacks and vulnerabilities. While much of security involves human error or negligence, foundational security based on the concepts of trust can … READ MOREDate Published: September, 13, 2016
For several years, Security Ledger (https://securityledger.com) has been hosting the Security of Things Forum in the Boston area. This year, Christian Science Monitor is co-hosting and the line-up looks great - speakers will offer IoT security perspective… READ MOREDate Published: September, 08, 2016
As part of its ongoing webcast series, Trusted Computing Group and members will host a session Tuesday, Sept. 20, 9:00 a.m. Pacific/12:00 p.m. to address how to secure the IoT with strong device identity and techniques to securing IoT endpoints and the ro… READ MOREDate Published: September, 01, 2016
Manufacturers worldwide are deeply concerned about protecting their processes, intellectual property, products and brands. While hacking of baby monitors and thermostats might grab headlines, larger problems are looming as manufacturers of all kinds of it… READ MOREDate Published: August, 29, 2016
South Korea’s importance to Information Technology and the Automotive Industry has continued to increase over the years and security considerations are a crucial success factor for those industries.. The Trusted Computing Group (TCG) is excited to b… READ MOREDate Published: August, 25, 2016
By now, almost all new storage drives - whether client or enterprise - include the ability to constantly encrypt data at rest. These drives, based on standards created by the Trusted Computing Group (http://www.trustedcomputinggroup.org/work-groups/storag… READ MOREDate Published: August, 01, 2016
As we’ve mentioned before here at Trusted Computing Group, we have been working actively in the Industrial Internet Consortium on the development of its to-be-published security framework. According to a recent post from the IIC, “…utilizing the I… READ MOREDate Published: July, 26, 2016
Storage expert and Forbes.com contributor Tom Coughlin has posted a blog about the growing amount and value of memory devices in cars. Coughlin notes, “...estimated 5% of the memory market goes into automobiles today and this is expected to grow to 1… READ MORE