Date Published: July, 31, 2018
The 'Manufacturer Usage Description' proposal from IETF offers a promising route for bolstering security across the industry.… READ MOREDate Published: July, 26, 2018
In this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and identit… READ MOREDate Published: July, 24, 2018
With the addition of support for the Trusted Platform Module 2.0 specification, Mocana is looking to help improve security updates and container deployment in embedded, Internet of Things (IoT) devices.… READ MOREDate Published: June, 11, 2018
Newton, MA – June 7, 2018 –Sensors Expo & Conference (#Sensors18), the industry’s largest event dedicated to sensors, connectivity, and systems announced that industry leaders including Cisco, Dell, IBM, Intel, and Microsoft will participate in … READ MOREDate Published: May, 21, 2018
Sensing is a major component of the IoT and an essential part of most Industrial IoT (IIoT) applications. By adding wireless connectivity and a microcontroller or other processor to a sensor node, one can… READ MOREDate Published: April, 12, 2018
"And the good girls go to heaven, but the bad girls go everywhere..." – This is what I have read when I was trying to know Lisa better on her Twitter account. Controversial, courageous, and ambitious, this woman has a lot to share… READ MOREDate Published: April, 12, 2018
While attacks and threats on PCs and servers have been well documented and addressed by a variety of solutions for many years, only recently have vulnerabilities of other parts of Internet of Things (IoT) systems been recognized – and exploited… READ MOREDate Published: April, 02, 2018
The Trusted Computing Group’s DICE Architecture offers a platform that provides a unique identity to protect vehicles and most other embedded systems.… READ MOREDate Published: March, 26, 2018
KISA to Contribute to IoT security and Resiliency and Global Standards… READ MOREDate Published: March, 22, 2018
There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.… READ MORE