The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at rest protection”.
This joint whitepaper describes the Trusted Computing Group Storage Work Gro... READ MORE
A SANS Analyst Survey sponsored by the Trusted Computing Group.
It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previously inaccessible with legacy devices. The modern workforce is demanding mobile device access to busi... READ MORE
Developed by the Federal CIO Council, this document serves as a toolkit in implementing BYOD programs within federal agencies.
A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs ... READ MORE
The embedded systems market is going through a profound transformation right now. Historically, embedded systems builders assumed that their systems were ultimately built to stand alone. Typical embedded systems, such as those in today’s automobiles, might contain more than a hundred individual processors, with multiple in-vehicle networks and millions of lines of code. Even so, the vehicle is a... READ MORE
Comply to Connect is a standards-based solution that addresses the problems many organizations face: how to ensure network security while allowing a wide range of individual devices to connect.
Comply to Connect is a standards-based solution that addresses the problems many organizations face: how to ensure network security while allowing a wide range of individual devices to connect. There is an... READ MORE
Unlike yesterday’s passive cyber-threats, which depended upon users’ actions for transmission, today’s stealthier tactics infect entire networks without any user involvement. Read this whitepaper to learn more.
Recently we have seen cyberthreats evolving from being passive requiring users' actions for transmission, to stealthier tactics that would infect entire network without any user invol... READ MORE
Changes in IF-MAP 2.0 enable new applications in fields such as cloud computing, Industrial Control Systems and SCADA security, physical security, and more. This whitepaper describes those changes and the potential implications.
To enable and ease new applications of IF-MAP, TCG has now separated IF-MAP into a base protocol (IF-MAP 2.0) and a set of network security metadata (IF-MAP Metadata for ... READ MORE
Detecting and thwarting the threats and vulnerabilities of today's computer systems and networks have challenged technical professionals from numerous companies and government organizations.
NIST's SCAP was created as a community effort to create a common set of standards to help express and automate configuration management. The SCAP standards provide a common language for organizations to perfor... READ MORE