Industry News

Mocana Security of Things Platform™ integrates support for the Infineon OPTIGA™ TPM

Date Published: October, 12, 2016

Munich, Germany and San Francisco, USA – September 7, 2016 – Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) and Mocana Corporation take IoT security to the next level. Embedded systems security specialist Mocana integrates support for the Infineon… READ MORE

HP Chromebook 13 G1 Review: Is It Good for Business?

Date Published: October, 12, 2016

HP’s Chromebook 13 G1 is ready for work, with the security and manageability features that IT departments demand. It also boasts an elegant, premium design, a sharp 13.3-inch display and zippy performance, making it an enticing option for everyday produ… READ MORE

Chrome OS adds enterprise identity verification

Date Published: October, 12, 2016

Uses Trusted Platform Module to confirm identity. Google has boosted security for its Chrome devices, adding verification that ensures enterprise network services know the identity of clients connecting to them. … READ MORE

Hackers Are Having a Field Day on China’s Wild Web

Date Published: October, 04, 2016

With thin encryption resources available, some 400,000 domestic hackers cost the economy $15 billion a year, by one estimate.… READ MORE

Securing networks in manufacturing

Date Published: September, 20, 2016

For manufacturing companies, a common weak link in their enterprise network is the production network. To establish secure manufacturing, several enterprise aspects must be addressed, ideally by a risk management team with support from senior leaders. The… READ MORE

31 Flavors of Trust

Date Published: September, 14, 2016

When billions of things are connected together in the IoT how can the trustworthiness of each thing be verified?… READ MORE

IoT Security to be Center Stage at Technology & Standards Forum

Date Published: August, 23, 2016

As we connect more and more of our lives to the internet, security becomes more and more important. We've all heard the stories of databases and devices being hacked. The question is, what are we doing about it? The answer is, a lot.… READ MORE

Protecting the IoT with self-encrypting storage, part 2

Date Published: August, 17, 2016

As noted in part one of this blog, self-encrypting storage (SES) will increasingly be required to protect embedded products, especially as the Internet of Things (IoT) expands. This encryption is already available in SED products. However, the next step … READ MORE

Protecting the IoT with self-encrypting storage, part 1

Date Published: August, 17, 2016

Problems associated with the loss of data, data breaches, brand damage/impact, and compliance issues are well known to desktop and portable computer users. To avoid the unauthorized access of the data on these types of products, the Trusted Computing Grou… READ MORE

Authentication's Upheaval Should Be Welcomed, Not Feared

Date Published: August, 11, 2016

From the buzz in the technology press over the last two weeks, one might think that end times are nigh in the world of authentication. Several media outlets wrote stories discussing NIST’s recent proposal around use of SMS-based solutions for digital a… READ MORE