Search Resources



Search Results

How to Trust Your Operational Technology (OT) Networks - A Look at Securing Manufacturing

Post Type: Post    Date added: September 27, 2016

Even as enterprises make progress on securing traditional IT networks, the OT, or operational technology, side of networks remain surprisingly vulnerable. Why? In the IT world, administrators regularly patch, use more current versions of hardware and software and use a variety of security tools. Latency is not a big issue, and if the network goes down briefly, nothing explodes or takes down the po...

追悼 山口英先生

Post Type: Post    Date added: September 20, 2016

by Jun Takei, Intel Corporation 日本の情報セキュリティに多大なる貢献をされてきた奈良先端科学技術大学院大学の山口英先生が2016年5月9日に急逝されました。 先生のいままでの功績は多くの場所にすでに書かれていますので、今回はTCGとの関係について先生への感謝の気持ちを込めて記したいと思...

Webcast: Securing IoT Endpoints, Networks and the Cloud

Post Type: Post    Date added: September 20, 2016

Endpoints in the IoT by nature are vulnerable to many kinds of attacks and exploits. Widely vetted security approaches can help close these vulnerabilities while also protecting networks and data that is stored in the cloud. This webcast, hosted by Trusted Computing Group and its members GlobalSign and Cisco, will illustrate key techniques for closing critical IoT sec...

Securing networks in manufacturing

Post Type: Post    Date added: September 20, 2016

For manufacturing companies, a common weak link in their enterprise network is the production network. To establish secure manufacturing, several enterprise aspects must be addressed, ideally by a risk management team with support from senior leaders. The foundation is built on:...

Most Security Human Error - But Trust Plays Key Role

Post Type: Post    Date added: September 15, 2016

In the world of cybersecurity, there certainly seems to be lots of work to do - each day brings new breaches, attacks and vulnerabilities. While much of security involves human error or negligence, foundational security based on the concepts of trust can provide more and better assurances against many such errors and indeed other security issues. At Structure Security conference in San Francisc...

31 Flavors of Trust

Post Type: Post    Date added: September 14, 2016

When billions of things are connected together in the IoT how can the trustworthiness of each thing be verified?...

Security of Things Forum Sept. 22, Cambridge, Features TCG Intel Speaker and Many Others; Discount Tickets Available

Post Type: Post    Date added: September 13, 2016

For several years, Security Ledger (https://securityledger.com) has been hosting the Security of Things Forum in the Boston area. This year, Christian Science Monitor is co-hosting and the line-up looks great - speakers will offer IoT security perspectives from the U.S. Department of Homeland Security, the world of medical devices, auto security, and more. From the event website: “The market ...

Trusted Computing Group Webcast September 20 to Discuss How to Close Security Gaps in the Internet of Things

Post Type: Post    Date added: September 12, 2016

PORTLAND, ORE., Sept. 12, 2016 -- Trusted Computing Group (TCG) and members GlobalSign and Cisco will discuss and demonstrate key techniques for closing critical IoT security gaps in a number of applications and endpoints in a webcast September 20. Attendees will learn how to mitigate risks in securing trust credentials using public key infrastructure (PKI) and the international ISO standards-b...

Trusted Computing Group September 20, 2016 Webcast to Address Strong Device Identity & Securing Endpoints

Post Type: Post    Date added: September 8, 2016

As part of its ongoing webcast series, Trusted Computing Group and members will host a session Tuesday, Sept. 20, 9:00 a.m. Pacific/12:00 p.m. to address how to secure the IoT with strong device identity and techniques to securing IoT endpoints and the role of trust and the TPM. Lancen LaChance of GlobalSign will look at authentication, privacy and integrity and securing trust credentials, usin...

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.