Date Published: September, 10, 2015
On Sept. 24, the Storage Networking Industry Association, or SNIA, will host the Data Storage Security Summit. This event includes a number of presentations and keynotes on the growing issue of data protection, the role of encryption, key management and e… READ MOREDate Published: August, 28, 2015
It seems like very day brings a different story about a hack or attack on the Internet of Things, or IoT. The number of connected devices, whether wearables or industrial control systems, has exploded but security has not kept pace. Many in the industry a… READ MOREDate Published: August, 20, 2015
Sept. 9-11, Washington, D.C., practitioners of security along with vendors, standards experts and researchers will gather at the Cybersecurity Innovation Forum. Hosted by the National Institute of Standards and Technology, with participation from the Nati… READ MOREDate Published: August, 17, 2015
Since this month’s BlackHat conference in Vegas, the media and blogs have lit up with headlines about hacked Jeeps, Teslas with vulnerable software and potential nuclear meltdowns as a result of poorly secured industrial network. That’s just the tip o… READ MOREDate Published: August, 11, 2015
Trusted Computing Group (TCG) has long worked with other industry groupsand the TCG Storage Work Group is no exception. Since it started developing the widely adopted specifications for self-encrypting drives (SEDs), TCG has been aligned with a number of … READ MOREDate Published: August, 03, 2015
The Trusted Computing Group (TCG) has released the “SWID Message and Attributes for IF-M” specification as a final specification. This specification enables communication about the software state of an endpoint as part of a Trusted Network Communicati… READ MOREDate Published: July, 30, 2015
The Flash Memory Summit has grown rapidly as applications and deployment of flash storage devices has grown, from client devices to enterprise storage systems. Once again, Trusted Computing Group and its members will play a big role in helping educate ven… READ MOREDate Published: July, 27, 2015
Wired.com recently published a frightening account of how a typical automobile can be hacked and controlled (more here at http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/). In the test, a reporter in a late model Jeep experienced a series … READ MOREDate Published: July, 23, 2015
While crashed trains or planes, power plant meltdowns or chemical spills can - and have - occurred as a result of poor security in the Internet of Things, financial gains represent a huge target for attackers and thieves - whether individuals, organized c… READ MOREDate Published: July, 21, 2015
Here in Santa Clara at Embedded Systems Conference Silicon Valley (#ESCSV), the halls are filled with embedded systems designers trying to learn the latest in design, development, tools and technologies. For us here at Trusted Computing Group, it is grati… READ MORE