TCG has teamed up with Embedded Computing Design to host a new series of podcasts (http://ow.ly/8gRO30eieqr) addressing IoT and embedded design, development and security issues. ECD’s Rich Nass and Brandon Lewis talk with Jeff Finn, CEO of data categorization and security firm Zvelo.
Finn describes how monitoring traffic coming from embedded, IoT, and network infrastructure devices with a snippet of source code can help security professionals categorize these systems based on their expected behavior, and issue cloud-based alerts when parameters are broken. They also give thoughts on recent legislation from the U.S. Senate that attempts to standardize security in the Internet of Things.
Watch for updates on this series including a special appearance by a TCG guest coming soon.
Listen here and make sure to check out our many resources on IoT security design and development here: https://trustedcomputinggroup.org/securing-insecure-iot/.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.