In the News

Dell, IBM, Intel and Microsoft Join 300+ Sensing Technology Providers at 2018 Sensors Expo & Conference

Date Published: June, 11, 2018

Newton, MA – June 7, 2018 –Sensors Expo & Conference (#Sensors18), the industry’s largest event dedicated to sensors, connectivity, and systems announced that industry leaders including Cisco, Dell, IBM, Intel, and Microsoft will participate in … READ MORE

Secure your Industrial IoT sensors, or else!

Date Published: May, 21, 2018

Sensing is a major component of the IoT and an essential part of most Industrial IoT (IIoT) applications. By adding wireless connectivity and a microcontroller or other processor to a sensor node, one can… READ MORE

Good Girls Go to Heaven, but Girls In Cyber Go Everywhere…An Exclusive Interview with Lisa Lorenzin, Director, Emerging Technology Solutions, Americas at Zscaler

Date Published: April, 12, 2018

"And the good girls go to heaven, but the bad girls go everywhere..." – This is what I have read when I was trying to know Lisa better on her Twitter account. Controversial, courageous, and ambitious, this woman has a lot to share… READ MORE

Protecting Routers and Other Network Equipment

Date Published: April, 12, 2018

While attacks and threats on PCs and servers have been well documented and addressed by a variety of solutions for many years, only recently have vulnerabilities of other parts of Internet of Things (IoT) systems been recognized – and exploited… READ MORE

Establishing Unique Identity and Security for Cost-Sensitive Embedded Products

Date Published: April, 02, 2018

The Trusted Computing Group’s DICE Architecture offers a platform that provides a unique identity to protect vehicles and most other embedded systems.… READ MORE

Trusted Computing Group Welcomes Korea Internet and Security Agency (KISA) as a Government Liaison Member

Date Published: March, 26, 2018

KISA to Contribute to IoT security and Resiliency and Global Standards… READ MORE

TPM – a Powerful, Inexpensive Security Building Block

Date Published: March, 22, 2018

There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.… READ MORE

A Roundtable Q&A on the Device Identity Composition Engine (DICE)

Date Published: March, 09, 2018

Senior Technology Editor Bill Wong held a group discussion with members of the Trusted Computing Group about its Device Identity Composition Engine (DICE) security standard.… READ MORE

Embedded Insiders – Episode #35 – What to Expect at Embedded World 2018

Date Published: March, 06, 2018

Believe it or not, Embedded World is just around the corner. The Insiders' show schedules are already full of meetings with tech vendors who will demonstrate their latest wares, but what are those? Tune in as the Insiders speculate as to what tec… READ MORE

Trusted Computing Group/Winbond at Embedded World 2018

Date Published: March, 05, 2018

Rich Nass, EVP of Editorial, interviews Ilia Stolov with Winbond at the Trusted Computing Group, in the shared Embedded Pavillion, booth 3A-507. #ew18 #iot @embedded_world… READ MORE