Industry News

MUD: The Solution to Our Messy Enterprise IoT Security Problems?

Date Published: July, 31, 2018

The 'Manufacturer Usage Description' proposal from IETF offers a promising route for bolstering security across the industry.… READ MORE

Breaking the Ice on DICE: scaling secure Internet of Things Identities

Date Published: July, 26, 2018

In this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and identit… READ MORE

Mocana Embraces TPM 2.0 for IoT Device Authentication Assurance

Date Published: July, 24, 2018

With the addition of support for the Trusted Platform Module 2.0 specification, Mocana is looking to help improve security updates and container deployment in embedded, Internet of Things (IoT) devices.… READ MORE

Dell, IBM, Intel and Microsoft Join 300+ Sensing Technology Providers at 2018 Sensors Expo & Conference

Date Published: June, 11, 2018

Newton, MA – June 7, 2018 –Sensors Expo & Conference (#Sensors18), the industry’s largest event dedicated to sensors, connectivity, and systems announced that industry leaders including Cisco, Dell, IBM, Intel, and Microsoft will participate in … READ MORE

Secure your Industrial IoT sensors, or else!

Date Published: May, 21, 2018

Sensing is a major component of the IoT and an essential part of most Industrial IoT (IIoT) applications. By adding wireless connectivity and a microcontroller or other processor to a sensor node, one can… READ MORE

Good Girls Go to Heaven, but Girls In Cyber Go Everywhere…An Exclusive Interview with Lisa Lorenzin, Director, Emerging Technology Solutions, Americas at Zscaler

Date Published: April, 12, 2018

"And the good girls go to heaven, but the bad girls go everywhere..." – This is what I have read when I was trying to know Lisa better on her Twitter account. Controversial, courageous, and ambitious, this woman has a lot to share… READ MORE

Protecting Routers and Other Network Equipment

Date Published: April, 12, 2018

While attacks and threats on PCs and servers have been well documented and addressed by a variety of solutions for many years, only recently have vulnerabilities of other parts of Internet of Things (IoT) systems been recognized – and exploited… READ MORE

Establishing Unique Identity and Security for Cost-Sensitive Embedded Products

Date Published: April, 02, 2018

The Trusted Computing Group’s DICE Architecture offers a platform that provides a unique identity to protect vehicles and most other embedded systems.… READ MORE

Trusted Computing Group Welcomes Korea Internet and Security Agency (KISA) as a Government Liaison Member

Date Published: March, 26, 2018

KISA to Contribute to IoT security and Resiliency and Global Standards… READ MORE

TPM – a Powerful, Inexpensive Security Building Block

Date Published: March, 22, 2018

There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.… READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.