In the News

Trust Proving You’re Legit – to Yourself and Others

Date Published: July, 01, 2015

So you’re buying a car. I don’t know how it works in other countries, but in the US, it’s one of the least favorite purchases someone can make. Partly it’s because it’s our only haggling purchase, and, as buyers, we’re not used to haggling, s… READ MORE

IoT Perspectives: News from Embedded Systems Design

Date Published: July, 01, 2015

We've been a broken record about IoT security, wondering where a vendor group was. Look no further. The Trusted Cmputing Group (TCG) has announced the availability of an architect's guide to its hardware-based TPM (Trusted Platform Module) 2.0 standard fo… READ MORE

6 Ways to Boost IoT Security

Date Published: June, 01, 2015

Six techniques can help create a secure foundation for devices that are part of the Internet of Things. The recent discovery of a security vulnerability that could allow even unskilled attackers to take over drug injection pumps and render them useless … READ MORE

IoT Security Groundswell Gathers

Date Published: May, 01, 2015

Author: Rick Merritt, SiliconValley Bureau Chief After plenty of talk, a wave of real action aimed at solving the Internet of Things's security problems is on the rise. At least twice a week someone pings me with an idea for a guest article on how enginee… READ MORE

Practical Advice For Securing the IoT

Date Published: May, 01, 2015

Note: The Trusted Computing Group will be presenting a class at the upcoming Embedded TechCon, June 8-10 in San Francisco on the topic of How (and Why) to Make the IoT Trusted. How can we secure the Internet of Things (IoT)? This topic has stirred consid… READ MORE

Long Tail Risk – IT Risk Management for the SMB Sector

Date Published: May, 01, 2015

Developing an IoT vendor strategy The vendor count for IoT systems that a company or organization manages will only increase in the coming months and years and it will possibly increase substantially. Some of this will be from traditional systems like HVA… READ MORE

When Will We Use Secure Storage Devices?

Date Published: April, 01, 2015

Technology to make the data stored on HDDs and SSDs secure is available in most of these products. The Trusted Computing Group Opal standard for Self-Encrypting Drives (SEDs) has been implemented in the controllers in almost all HDDs and all SSDs. But des… READ MORE

8 Views of Security from RSA: Internet of Things Lacks Root of Trust

Date Published: April, 01, 2015

SAN FRANCISCO — The Internet of Things, along with everything else, is insecure. The U.S. government wants to help with that and other security problems — if you still trust them. Those were two of several messages from the annual RSA Conference here… READ MORE

RSAC15 Roundup

Date Published: April, 01, 2015

Michela Menting, Practice Director The RSA Conference 2015 was a busy one for me this year and I met up with about 30 different companies during the week. The big topics this year that I wanted to highlight flowed around automation, threat intelligence … READ MORE

Bold Reform Needed to Strengthen Our Cybersecurity

Date Published: January, 01, 2015

Mr. President, the status quo in cybersecurity is failing this country. It is failing our commercial sector, which is being publicly breached on a weekly basis, and it is failing our government sector as well. It is time to take bold and decisive action t… READ MORE