In the News

Five vital Windows 2016 security updates

Date Published: July, 01, 2015

Windows Server 2016 is almost here. The preview, dubbed the Windows Server Technical Preview, is available now with the final release slated for early next 2016. Regardless of your current plans for Windows 2016, it's good to think about how these changes… READ MORE

Cloud Computing – Gaining the Benefits, Avoiding the Risks

Date Published: July, 01, 2015

hardware, the integrity of virtualized and non-virtualized Intel x86 servers and workloads is verified remotely using Intel® Trusted Execution Technology (TXT) and Trusted Platform Module (TPM) technology on Intel Xeon processors. If this "remote attesta… READ MORE

Trust Proving You’re Legit – to Yourself and Others

Date Published: July, 01, 2015

So you’re buying a car. I don’t know how it works in other countries, but in the US, it’s one of the least favorite purchases someone can make. Partly it’s because it’s our only haggling purchase, and, as buyers, we’re not used to haggling, s… READ MORE

IoT Perspectives: News from Embedded Systems Design

Date Published: July, 01, 2015

We've been a broken record about IoT security, wondering where a vendor group was. Look no further. The Trusted Cmputing Group (TCG) has announced the availability of an architect's guide to its hardware-based TPM (Trusted Platform Module) 2.0 standard fo… READ MORE

6 Ways to Boost IoT Security

Date Published: June, 01, 2015

Six techniques can help create a secure foundation for devices that are part of the Internet of Things. The recent discovery of a security vulnerability that could allow even unskilled attackers to take over drug injection pumps and render them useless … READ MORE

IoT Security Groundswell Gathers

Date Published: May, 01, 2015

Author: Rick Merritt, SiliconValley Bureau Chief After plenty of talk, a wave of real action aimed at solving the Internet of Things's security problems is on the rise. At least twice a week someone pings me with an idea for a guest article on how enginee… READ MORE

Practical Advice For Securing the IoT

Date Published: May, 01, 2015

Note: The Trusted Computing Group will be presenting a class at the upcoming Embedded TechCon, June 8-10 in San Francisco on the topic of How (and Why) to Make the IoT Trusted. How can we secure the Internet of Things (IoT)? This topic has stirred consid… READ MORE

Long Tail Risk – IT Risk Management for the SMB Sector

Date Published: May, 01, 2015

Developing an IoT vendor strategy The vendor count for IoT systems that a company or organization manages will only increase in the coming months and years and it will possibly increase substantially. Some of this will be from traditional systems like HVA… READ MORE

When Will We Use Secure Storage Devices?

Date Published: April, 01, 2015

Technology to make the data stored on HDDs and SSDs secure is available in most of these products. The Trusted Computing Group Opal standard for Self-Encrypting Drives (SEDs) has been implemented in the controllers in almost all HDDs and all SSDs. But des… READ MORE

8 Views of Security from RSA: Internet of Things Lacks Root of Trust

Date Published: April, 01, 2015

SAN FRANCISCO — The Internet of Things, along with everything else, is insecure. The U.S. government wants to help with that and other security problems — if you still trust them. Those were two of several messages from the annual RSA Conference here… READ MORE