Industry News

Trusted Computing Group and Industrial Internet Consortium team via liaison relationship for better IoT security

Date Published: January, 01, 2016

Trusted Computing Group has been working for more than a dozen years to provide baseline technologies and industry standards for securing devices, data, and networks. Its greatest hits list includes the Trusted Platform Module, or TPM, which to date has b… READ MORE

Storage Visions Conference

Date Published: January, 01, 2016

The Storage Visions Conference, January 4 & 5, 2016 at the Luxor Hotel in Las Vegas will include a keynote talk by Barbara Murphy, from HGST on Elastic Storage and Active Archives. The conference theme is: Storage for the Next 5,000 Years (inspired b… READ MORE

End-to-End IoT Security Starts with the Infrastructure

Date Published: January, 01, 2016

It’s been three months into your embedded development, and the engineering team just reported the security architecture design is complete. Hardware, operating system, algorithms, protocols, everything is ready to start developing—that is, until someo… READ MORE

Security is the Key to Success for MCU-based IoT Applications

Date Published: January, 01, 2016

As the Internet of Things (IoT) expands, there is growing concern over how to safeguard the massive amount of data transmitted and stored by IoT devices. MCUs that support standard encryption, decryption, and authentication algorithms can help mitigate co… READ MORE

Standardizing Trust for Embedded Systems

Date Published: January, 01, 2016

If you haven’t been concerned about malicious players hacking into your products in the past, or haven’t found success with previous efforts, it’s time for renewed attention and action. Hacking efforts aren’t slowing and, in fact, are on the rise.… READ MORE

Fraunhofer Rolls Security Platform for Cars

Date Published: August, 01, 2015

Electronic control units in today’s vehicles are connected to engine control, steering, even the behaviour of the brakes. In an average vehicle several dozens of these small computers are doing their service; some top models have more than 100. “Infor… READ MORE

Trilogy Tech Talk Video – Trusted Computing

Date Published: August, 01, 2015

READ MORE

Securing the Connected Auto

Date Published: August, 01, 2015

Authors: Seigo Kotani and Ira McDonald A specification for providing hardware root of trust is evolving to serve the need to secure tomorrow's automobiles. Modern automotive vehicles rely on hundreds of sensors and electronic control units (ECUs) that m… READ MORE

Using a Trusted Platform Module and Trusted Brokered IO as the Foundation of IoT Security

Date Published: August, 01, 2015

Author: Brandon Lewis If you remember the 90s you probably remember the spread of unwanted software and the subsequent proliferation of antivirus/security products from Norton, McAfee, and others. Today’s IoT is similar to those early days of the PC in… READ MORE

Should IoT Security Be Regulated By Industry or Government?

Date Published: August, 01, 2015

Author: Brandon Lewis After a day full of security presentations, the audience for “The Biggest Challenges Faced by Developers” panel at IoT Evolution Developers Conference wasn’t changing gears. Whether the questions posed to David Kleidermacher o… READ MORE