Member Releases

Root of Trust: Foundation for IT Security

Date Published: May, 01, 2014

A tsunami of news reports about data breaches, attacks and hacks has left the security and IT communities reeling – and busy. And a huge number of additional incidents are never reported, or even worse, not detected. Enter the TPM, or Trusted Platform M… READ MORE

Secure Hubs for the Internet of Things

Date Published: April, 01, 2014

At CeBIT 2014 Fraunhofer SIT presented for the first time a solution that creates trusted IT networks, which even provides protection against the router viruses developed recently by British researchers. The “Trusted Core Network” (TCN) reviews the st… READ MORE

Infineon Collaborates with Design Engineering Firm to Bring Hardware-Based Security to Embedded Systems

Date Published: February, 01, 2014

San Francisco – February 24, 2014 – Infineon Technologies North America today announced that embedded security engineering firm, Valicore Technologies, Inc. is qualified to provide design and software implementation support for systems based on Infine… READ MORE

Infineon Teams up with Engineering and Consulting Services Provider to Support Secure Embedded Systems Designs

Date Published: February, 01, 2014

San Francisco – February 24, 2014 – Infineon Technologies North America today announced that it is working with Digital Management, Inc. (DMI), an engineering and consulting services provider, to support secure embedded systems design projects in Nort… READ MORE

Commonly Asked Questions and Answers for Data Security Using TCG Self-Encrypting Drive Technology

Date Published: July, 01, 2013

On June 11, 2013 the Trusted Computing Group (TCG) alongside its key panelists, Tom Coughlin of Coughlin Associates, Michael Willett, Samsung and Hussein Syed of Barnabas Health hosted a webcast on the realities of using self-encrypting drives tod… READ MORE

Tags:

Basics of Cloud Security

Date Published: March, 13, 2012

Cloud evolution can be considered synonymous to banking system. In good old days, people used to keep all the valuable assets (money, precious metals, stones etc.) in their personal possessions and even in underground lockers. They could not trust the ban… READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.