Establishing a root of trust: Trusted computing and Intel-based systems

STEVE EDWARDS, CURTISS-WRIGHT DEFENSE SOLUTIONS – Embedded.com  In the global defense-electronics market there is a growing demand for trusted computing solutions that carry effective protections against cyberattacks. Users want to be confident that when they power up their deployed embedded system, the code that their system is running can be trusted. In this sense,”trusted” means … Continue reading “Establishing a root of trust: Trusted computing and Intel-based systems”

The post Establishing a root of trust: Trusted computing and Intel-based systems appeared first on Trusted Computing Group.

from Establishing a root of trust: Trusted computing and Intel-based systems

TCG to Talk Industrial IoT Security in Barcelona, IoT Solutions World Congress, October 3

TCG members and security experts are hosting a special session, How to Build Secure, Highly Reliable Critical Systems and Networks for the IoT on October 3, 2017 at the IoT Solutions World Congress (link to https://trustedcomputinggroup.org/press-rooms/events/iot-solutions-world-congress-2/). Convergence of critical systems with those connected to the broader Internet are creating massive security concerns, real and anticipated. Even for … Continue reading “TCG to Talk Industrial IoT Security in Barcelona, IoT Solutions World Congress, October 3”

The post TCG to Talk Industrial IoT Security in Barcelona, IoT Solutions World Congress, October 3 appeared first on Trusted Computing Group.

from TCG to Talk Industrial IoT Security in Barcelona, IoT Solutions World Congress, October 3

Securing Network Gear Critical to IoT and Enterprise Security; TCG Needs Your Input Now!

Trusted Computing Group recently announced new work to secure the critical network gear that the Internet and connected things rely on. The group is now seeking input from the industry through Sept. 11, 2017. Input can be sent to admin@trustedcomputinggroup.org. TCG Guidance for Securing Network Equipment was developed to address the integrity of network equipment, … Continue reading “Securing Network Gear Critical to IoT and Enterprise Security; TCG Needs Your Input Now!”

The post Securing Network Gear Critical to IoT and Enterprise Security; TCG Needs Your Input Now! appeared first on Trusted Computing Group.

from Securing Network Gear Critical to IoT and Enterprise Security; TCG Needs Your Input Now!

OSNEXUS and Pogo Linux Partner to Offer Secure NAS Solution Compliant with the Criminal Justice Information Services Standard

BELLEVUE, Wash., June 14, 2017 /PRNewswire/ — OSNEXUS, the leading developer of Software-Defined Storage (SDS) solutions, and Pogo Linux, a leading provider of server and storage products, today announced that QuantaStor SDS will be offered on the Pogo Linux Storage Sentinel Q4236 Secure NAS Appliance. This new storage solution will provide an unprecedented level of security for industries such … Continue reading “OSNEXUS and Pogo Linux Partner to Offer Secure NAS Solution Compliant with the Criminal Justice Information Services Standard”

The post OSNEXUS and Pogo Linux Partner to Offer Secure NAS Solution Compliant with the Criminal Justice Information Services Standard appeared first on Trusted Computing Group.

from OSNEXUS and Pogo Linux Partner to Offer Secure NAS Solution Compliant with the Criminal Justice Information Services Standard

Making “Connections” at the Industrial IoT University

Embedded Computing Design’s second Industrial IoT University conference occurred this week, with industry experts from Cisco, zigbee alliance, Digi International, LoRa Alliance, Trusted Computing Group, Renesas, Mentor Graphics, Wind River, Software Design Solutions, and Blue Ridge Advanced Design and Automation addressing networking and security challenges for an audience of more than 100 IoT engineers.

The post Making “Connections” at the Industrial IoT University appeared first on Trusted Computing Group.

from Making “Connections” at the Industrial IoT University

WannaCry Delivers a Wake-up Call for Protecting Industrial Control Systems: (Part 1)

The recent ransomware worm in the WannaCrypt or WannaCry (Wcry) malware infected more than 200,000 systems across 150 countries. The virus targeted out of date computing systems not unlike those that can be found in an industrial control system (ICS). While WannaCry impacted banks, healthcare providers and other non-industrial entities this time, next time the … Continue reading “WannaCry Delivers a Wake-up Call for Protecting Industrial Control Systems: (Part 1)”

The post WannaCry Delivers a Wake-up Call for Protecting Industrial Control Systems: (Part 1) appeared first on Trusted Computing Group.

from WannaCry Delivers a Wake-up Call for Protecting Industrial Control Systems: (Part 1)

TCG Releases Trust Assessment Framework

In today’s enterprise, cloud computing allows enterprises to acquire or maintain computer services without building the infrastructure themselves. Cloud services often are combined with in-house infrastructure in a model that’s known as the hybrid cloud. Companies also often need to link in-house or cloud services that one business is using (or supplying) with the internal … Continue reading “TCG Releases Trust Assessment Framework”

The post TCG Releases Trust Assessment Framework appeared first on Trusted Computing Group.

from TCG Releases Trust Assessment Framework

Five Minutes With…Bill Diotte, CEO, Mocana

Hacking continues and breeches still occur, regardless of how much emphasis we put on security. Why is that? Is it simply that the hackers are smarter than the folks designing in the security? That’s the question I asked Bill Diotte, the CEO of Mocana, one of the leaders in IoT security, in this week’s installment … Continue reading “Five Minutes With…Bill Diotte, CEO, Mocana”

The post Five Minutes With…Bill Diotte, CEO, Mocana appeared first on Trusted Computing Group.

from Five Minutes With…Bill Diotte, CEO, Mocana