Update Dec. 21, 2013: Developments this week support the notion that the NSA is seeking to compromise security systems, especially crypto systems. First, this report from Reuters claims that RSA, the ...
On Wednesday, three companies that sell products and services aimed at securing corporate computers and data told attendees at the RSA Conference 2003 here that trusted computers would help businesses ...
The "Trusted Computing" technologies promoted by major IT companies such as Microsoft and IBM could have negative consequences for customers and rival software makers, according to security experts.
In a discussion chaired Derek Brink, VP and research fellow from the Aberdeen Group, the panel provided a brief crash course on the concept of ‘trusted computing’ and examined reasons why industry has ...
The Trusted Computing Group (TCG) is a global organization that develops open security standards and specifications based on root of trust enabling secure interoperable systems and networks across ...
A respected mentor of mine, Steven Northcutt of SANS, once told me, “Eat the watermelon and spit out the seeds.” It’s an appropriate metaphor: There is often truth buried in statements and concepts we ...
Are we serious about combating the threats against our computers, our livelihood and the applications that we write and use everyday? While one way to take the offense is to write better code, I ...
ITworld.com – David Geer recently spoke with Steven Sprague, one of the original founders of the Trusted Computing Group, a nonprofit forum to develop open standards for hardware-enabled trusted ...
At some point, you will find yourself asking – is my device actually running the code I expect it to? [bunnie] aka [Andrew Huang] is passionate about making devices you can fundamentally, deeply trust ...