Date Published: July, 01, 2015
There's no question that the Internet of Things can make an enterprise more efficient. The harmonizing of sensors, devices, and data harmonized into one system gives rise to context-aware computation and enables the environment to respond instantly to cha… READ MOREDate Published: July, 01, 2015
Windows Server 2016 is almost here. The preview, dubbed the Windows Server Technical Preview, is available now with the final release slated for early next 2016. Regardless of your current plans for Windows 2016, it's good to think about how these changes… READ MOREDate Published: July, 01, 2015
hardware, the integrity of virtualized and non-virtualized Intel x86 servers and workloads is verified remotely using Intel® Trusted Execution Technology (TXT) and Trusted Platform Module (TPM) technology on Intel Xeon processors. If this "remote attesta… READ MOREDate Published: July, 01, 2015
So you’re buying a car. I don’t know how it works in other countries, but in the US, it’s one of the least favorite purchases someone can make. Partly it’s because it’s our only haggling purchase, and, as buyers, we’re not used to haggling, s… READ MOREDate Published: July, 01, 2015
We've been a broken record about IoT security, wondering where a vendor group was. Look no further. The Trusted Cmputing Group (TCG) has announced the availability of an architect's guide to its hardware-based TPM (Trusted Platform Module) 2.0 standard fo… READ MOREDate Published: June, 01, 2015
Six techniques can help create a secure foundation for devices that are part of the Internet of Things. The recent discovery of a security vulnerability that could allow even unskilled attackers to take over drug injection pumps and render them useless … READ MOREDate Published: May, 01, 2015
Author: Rick Merritt, SiliconValley Bureau Chief After plenty of talk, a wave of real action aimed at solving the Internet of Things's security problems is on the rise. At least twice a week someone pings me with an idea for a guest article on how enginee… READ MOREDate Published: May, 01, 2015
Note: The Trusted Computing Group will be presenting a class at the upcoming Embedded TechCon, June 8-10 in San Francisco on the topic of How (and Why) to Make the IoT Trusted. How can we secure the Internet of Things (IoT)? This topic has stirred consid… READ MOREDate Published: May, 01, 2015
Developing an IoT vendor strategy The vendor count for IoT systems that a company or organization manages will only increase in the coming months and years and it will possibly increase substantially. Some of this will be from traditional systems like HVA… READ MOREDate Published: April, 01, 2015
Technology to make the data stored on HDDs and SSDs secure is available in most of these products. The Trusted Computing Group Opal standard for Self-Encrypting Drives (SEDs) has been implemented in the controllers in almost all HDDs and all SSDs. But des… READ MORE