Interconnected networks are critical to the operation of a broad and growing range of devices and services, from computers and phones to industrial systems and critical infrastructure.
The integrity and security of routers, switches, and firewalls is essential to network reliability, as well as to the integrity and privacy of data on these networks. As increasingly... READ MORE
Endpoints in the IoT by nature are vulnerable to many kinds of attacks and exploits. Widely vetted security approaches can help close these vulnerabilities while also protecting networks and data that is stored in the cloud. This webcast, hosted by Trusted Computing Group and its members GlobalSign and Cisco, will illustrate key techniques for closing critical IoT sec... READ MORE
Loss of IP Can Cost Companies Millions – or Even the Business. Join this Webcast to Learn How to Protect Data in the Internet of Things
Attackers often use reverse engineering to locate software vulnerabilities that they then
can exploit to create counterfeit products, steal sensitive data, or tamper with for sabotage and espionage purposes.
In IoT and embedded systems, this can lead ... READ MORE
This webcast, based on TCG's Architect’s Guide, shows information technology and control systems executives and architects how to implement a standards-based, interoperable approach to ICS security as specified in ISA 99 (now IEC 62443) and ISA 100.15.
Attendees heard from leading ICS experts regarding these standards and how IT and control system executives and architects can implement a... READ MORE
Securing IoT with Trusted Computing
Securing IoT with Trusted Computing demonstration built by Trusted Computing Group member companies Cisco, Infineon, and Intel with the assistance of Applied Sciences, Rapperswil, presented at RSA 2015 during the the TCG Association Seminar and Demonstration Showcase: Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions.
Dowloa... READ MORE
SANS Institute has developed a first-of-its-kind guide and informational webcast to update organizations on exciting new uses for implementing hardware roots of trust, enabled by the Trusted Platform Module.
Learn How to Implement a Ubiquitous Technology Already Embedded in Enterprise Endpoints
In this document SANS looks at the broad industry support for TPM, the standards behind it. The repo... READ MORE