Date Published: October, 12, 2016
Munich, Germany and San Francisco, USA – September 7, 2016 – Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) and Mocana Corporation take IoT security to the next level. Embedded systems security specialist Mocana integrates support for the Infineon… READ MOREDate Published: October, 12, 2016
HP’s Chromebook 13 G1 is ready for work, with the security and manageability features that IT departments demand. It also boasts an elegant, premium design, a sharp 13.3-inch display and zippy performance, making it an enticing option for everyday produ… READ MOREDate Published: October, 12, 2016
Uses Trusted Platform Module to confirm identity. Google has boosted security for its Chrome devices, adding verification that ensures enterprise network services know the identity of clients connecting to them. … READ MOREDate Published: October, 04, 2016
With thin encryption resources available, some 400,000 domestic hackers cost the economy $15 billion a year, by one estimate.… READ MOREDate Published: September, 20, 2016
For manufacturing companies, a common weak link in their enterprise network is the production network. To establish secure manufacturing, several enterprise aspects must be addressed, ideally by a risk management team with support from senior leaders. The… READ MOREDate Published: September, 14, 2016
When billions of things are connected together in the IoT how can the trustworthiness of each thing be verified?… READ MOREDate Published: August, 23, 2016
As we connect more and more of our lives to the internet, security becomes more and more important. We've all heard the stories of databases and devices being hacked. The question is, what are we doing about it? The answer is, a lot.… READ MOREDate Published: August, 17, 2016
As noted in part one of this blog, self-encrypting storage (SES) will increasingly be required to protect embedded products, especially as the Internet of Things (IoT) expands. This encryption is already available in SED products. However, the next step … READ MOREDate Published: August, 17, 2016
Problems associated with the loss of data, data breaches, brand damage/impact, and compliance issues are well known to desktop and portable computer users. To avoid the unauthorized access of the data on these types of products, the Trusted Computing Grou… READ MOREDate Published: August, 11, 2016
From the buzz in the technology press over the last two weeks, one might think that end times are nigh in the world of authentication. Several media outlets wrote stories discussing NIST’s recent proposal around use of SMS-based solutions for digital a… READ MORE