Date Published: January, 01, 2016
Trusted Computing Group has been working for more than a dozen years to provide baseline technologies and industry standards for securing devices, data, and networks. Its greatest hits list includes the Trusted Platform Module, or TPM, which to date has b… READ MOREDate Published: January, 01, 2016
The Storage Visions Conference, January 4 & 5, 2016 at the Luxor Hotel in Las Vegas will include a keynote talk by Barbara Murphy, from HGST on Elastic Storage and Active Archives. The conference theme is: Storage for the Next 5,000 Years (inspired b… READ MOREDate Published: January, 01, 2016
It’s been three months into your embedded development, and the engineering team just reported the security architecture design is complete. Hardware, operating system, algorithms, protocols, everything is ready to start developing—that is, until someo… READ MOREDate Published: January, 01, 2016
As the Internet of Things (IoT) expands, there is growing concern over how to safeguard the massive amount of data transmitted and stored by IoT devices. MCUs that support standard encryption, decryption, and authentication algorithms can help mitigate co… READ MOREDate Published: January, 01, 2016
If you haven’t been concerned about malicious players hacking into your products in the past, or haven’t found success with previous efforts, it’s time for renewed attention and action. Hacking efforts aren’t slowing and, in fact, are on the rise.… READ MOREDate Published: August, 01, 2015
Electronic control units in today’s vehicles are connected to engine control, steering, even the behaviour of the brakes. In an average vehicle several dozens of these small computers are doing their service; some top models have more than 100. “Infor… READ MOREDate Published: August, 01, 2015
Authors: Seigo Kotani and Ira McDonald A specification for providing hardware root of trust is evolving to serve the need to secure tomorrow's automobiles. Modern automotive vehicles rely on hundreds of sensors and electronic control units (ECUs) that m… READ MOREDate Published: August, 01, 2015
Author: Brandon Lewis If you remember the 90s you probably remember the spread of unwanted software and the subsequent proliferation of antivirus/security products from Norton, McAfee, and others. Today’s IoT is similar to those early days of the PC in… READ MOREDate Published: August, 01, 2015
Author: Brandon Lewis After a day full of security presentations, the audience for “The Biggest Challenges Faced by Developers” panel at IoT Evolution Developers Conference wasn’t changing gears. Whether the questions posed to David Kleidermacher o… READ MORE