Thursday, April 24th, 2014

February 2014, At the RSA 2014 conference in San Francisco, a great deal of the discussion was on the management and threat reduction due to changes in the DHCP and DNS protocols and their attacks by malware & outside network services. These changes include support for IPV6 and legacy IPV4 devices on the same network. [...]

February 2014 – At the RSA 2014 conference in San Francisco, the theme of security had an underlying theme of mobile devices/thin clients connected to high speed and cloud based networks. These networks have been updated to the latest generation multicore servers which have enhanced throughput. As a result the edge of network devices in [...]

February 25, 2014, RSA Conference, San Francisco—Wave Systems (www.wave.com) is combining features of the Trusted Platform Module and some software to create functionality of a smart card without any physical devices. The package stores authentication credentials in TPM containers, so they can offer security comparable to that of a smart card or other physical media. [...]

February 25, 2014, San Francisco—Wade Baker from Verizon outlined the contents of the latest DBIR. The reporting and participating groups are now up to 50 contributors across the world and include forensics, vendors, various CERTs, police, and other investigative organizations. This report has been published since 2008 and has grown over time. Some of the [...]

February 25, 2014, RSA Conference, San Francisco—Dwayne Melancon from Tripwire presented the concept of games as the framework for security. Many of the user interfaces can use Diablo as the pattern for the UI. Game players depend upon various de facto standards for game interfaces. The games have methods and models that provide the elements [...]

February 24, 2014, RSA Conference, Trusted Computing Group, San Francisco—A panel considered the challenges in implementing TPM. Paul Roberts from The Security Ledger moderated the panel. Panelists were Monty Wiseman from Intel, Dustin Ingalls from Microsoft, and Gal Shpantzer from SANS. The industry has reached an inflection point in the technology, moving towards greater adoption [...]

February 24, 2014, RSA Conference, Trusted Computing Group, San Francisco—Jon Oltsik from the Enterprise Strategy Group moderated a panel focused on compliance and automation implementations. Panel members were Steve Whitlock from Boeing, Dan Griffin from JW Secure, and David Waltermire from NIST. In this time of security skill shortages and increased attack vectors, can standards [...]

September 2013, Intel Developer Forum, San Francisco—Bill Futral described the latest implementations of the Trusted Computing Group’s trusted platform module. The latest TPM specification 00.99 was released in August 2013. {edcs007} The TPM is an embedded microcontroller that stores keys, passwords, and certificates that is attached to a motherboard. The separate module is more secure [...]

October 2013 – The Demo Fall 2013 event in Santa Clara had a large diversity of software and solutions. In a time when new developments and innovation seem constrained to just being an android or iOS app, the Demo team located a number of new products in a larger variety of spaces. The show covered [...]

September 24, 2013, IEEE SCV CESoc, Santa Clara, CA—Shane Dyer from Arrayent talked about developing products that can do their functions and not have some type of computer interface. This issue is becoming increasingly important as we approach the Internet of Things that are all on line and connected. Many new non-computer product categories are [...]