Date Published: August, 02, 2016
MICROSOFT HAS MADE IT MANDATORY for all Windows 10 PCs, smartphones and tablets to support the Trusted Platform Module 2.0 (TPM 2.0) standard. Microsoft is mandating the hardware changes in a bid to improve Windows security, as it incorporates support fo… READ MOREDate Published: July, 12, 2016
CIA, TPM and IoT: You might ask what these three acronyms have in common and how they relate to each other. To make a long story short, it is all about security, trust, and reliability. The abbreviation CIA in this context does not mean the Central Intell… READ MOREDate Published: June, 06, 2016
By Henry T. Casey PC makers often list a Trusted Platform Module (TPM) as a security feature for business notebooks and desktops, but you may not know what it is or why it's useful. Primarily, the TPM enhances security above and beyond the capabilities o… READ MOREDate Published: March, 17, 2016
Protecting sensitive personal and business data is a big concern, with all the reports of hacking and identity theft. The RSA Conference focuses on digital security trends, threats and products. The Trusted Computing Group (TCG) was an important participa… READ MOREDate Published: March, 02, 2016
The first day of 2016's RSA Security Conference is in the books, and the ESG team offered some thoughts from San Francisco on the sights, sounds, and news from the event: Doug Cahill, Senior Analyst The first day of the RSA Conference is as much about t… READ MOREDate Published: February, 01, 2016
In-brief: A prominent Googler says the company is committed to keeping the Android operating system open source, but wouldn’t mind the security benefits that come with Apple’s closed iOS ecosystem, either! Google’s Android operating system has prov… READ MOREDate Published: February, 01, 2016
Day 1 of the 2016 RSA Conference. Vendors are still setting up their booths in the exhibition hall but the sessions have begun in earnest. Here are a few highlights of what I’ve heard so far: ted talk Four mindblowing Ted Talks for techies TED ta… READ MOREDate Published: January, 01, 2016
Trusted Computing Group has been working for more than a dozen years to provide baseline technologies and industry standards for securing devices, data, and networks. Its greatest hits list includes the Trusted Platform Module, or TPM, which to date has b… READ MOREDate Published: January, 01, 2016
The Storage Visions Conference, January 4 & 5, 2016 at the Luxor Hotel in Las Vegas will include a keynote talk by Barbara Murphy, from HGST on Elastic Storage and Active Archives. The conference theme is: Storage for the Next 5,000 Years (inspired b… READ MOREDate Published: January, 01, 2016
It’s been three months into your embedded development, and the engineering team just reported the security architecture design is complete. Hardware, operating system, algorithms, protocols, everything is ready to start developing—that is, until someo… READ MORE