Search Resources



Search Results

Data Protection Key to IoT and Embedded Systems

Post Type: Post    Date added: August 25, 2016

By now, almost all new storage drives - whether client or enterprise - include the ability to constantly encrypt data at rest. These drives, based on standards created by the Trusted Computing Group (http://www.trustedcomputinggroup.org/work-groups/storage/), include solid state, hard disk, hybrid, enterprise and even some USB ones from almost all storage vendors. What might be surprising is th...

IoT Security to be Center Stage at Technology & Standards Forum

Post Type: Post    Date added: August 23, 2016

As we connect more and more of our lives to the internet, security becomes more and more important. We've all heard the stories of databases and devices being hacked. The question is, what are we doing about it? The answer is, a lot....

Protecting the IoT with self-encrypting storage, part 2

Post Type: Post    Date added: August 17, 2016

As noted in part one of this blog, self-encrypting storage (SES) will increasingly be required to protect embedded products, especially as the Internet of Things (IoT) expands. This encryption is already available in SED products. However, the next step is activating the drive and managing the authentication credentials to lock and unlock drives and only allow authorized access to the drive....

Protecting the IoT with self-encrypting storage, part 1

Post Type: Post    Date added: August 17, 2016

Problems associated with the loss of data, data breaches, brand damage/impact, and compliance issues are well known to desktop and portable computer users. To avoid the unauthorized access of the data on these types of products, the Trusted Computing Group developed a specification for self-encrypting drives (SEDs)....

TCG Guidance for Securing Resource-Constrained Devices

Post Type: Post    Date added: August 12, 2016

This reference document provides implementation guidance for trusted platforms built with resource-constrained devices. This reference document is not a TCG Specification and therefore is not normative. Latest Version: TCG Guidance for Securing Resource-Constrained Devices Version 1 Revision 17 ...

Authentication's Upheaval Should Be Welcomed, Not Feared

Post Type: Post    Date added: August 11, 2016

From the buzz in the technology press over the last two weeks, one might think that end times are nigh in the world of authentication. Several media outlets wrote stories discussing NIST’s recent proposal around use of SMS-based solutions for digital authentication in the U.S. government, with headlines like “NIST axes SMS-based two factor authentication” and “U.S. government says SMS c...

Trusted Computing Group Announces New Work Group to Address Security in Persistent Memory

Post Type: Post    Date added: August 8, 2016

SANTA CLARA, Calif., August 8, 2016 – Trusted Computing Group has announced here at the Flash Memory Summit a new work group to develop industry standards and specifications for persistent memory to prevent data theft and attacks, especially in data centers. TCG previously has developed widely adopted standards for self-encrypting drives, or SEDs, that are used in almost all new solid state d...

GE, Intel, Microsoft, MIT, Red Hat, Schneider and the World Economic Forum, IoTS World Congress keynotes

Post Type: Post    Date added: August 8, 2016

The new edition of the Internet of Things Solutions World Congress (IoTSWC) will gather once again the world’s leading industrial internet experts in Fira de Barcelona in October. During three days companies such as ABB, Accenture, Bosch, Dassault, Deloitte, GE, Intel, IBM, Microsoft, MIT, Red Hat, Schneider and Vodafone will showcase their latest solutions and breakthroughs in Internet of Thing...

IoT Security Front and Center at Next CTA Technology & Standards Forum

Post Type: Post    Date added: August 2, 2016

Today, the Consumer Technology Association (CTA)™ announced it will focus on security issues involving the Internet of Things (IoT) at its next Technology & Standards Forum in October. The Security Summit will feature panel discussions and presentations on security, privacy and IoT from the FIDO Alliance, Internet Society, Online Trust Alliance and Trusted Computing Group....

Windows 10 security just got better

Post Type: Post    Date added: August 2, 2016

We have been warning you for a while that time is running out to upgrade to Windows 10 for free. Well it's finally here, the July 29 deadline is upon us. After that, the upgrade will cost you $119. One great reason why you should upgrade is because of Windows 10's security features....

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.