Tuesday, July 29th, 2014

May 2014, Internet of Things Conference, Santa Clara, CA—We talked with Uday Mudoi from Vitesse about the company and their products. They are falling back on their years of experience in Ethernet products to change the company focus. The drivers are in the growing acceptance of FbE in enterprise networks. Although the internals of the [...]

May 7, 2014, Internet of Things Developers Conference, Santa Calara, CA—Kin-Yip Liu from Cavium talked about the bigger industry drivers for semiconductors. Of course, performance and power are at the top of the list, but integrated functionality is starting to matter. For example, in security functions, new issues are for transactions and access authorizations, especially [...]

February 2014, At the RSA 2014 conference in San Francisco, a great deal of the discussion was on the management and threat reduction due to changes in the DHCP and DNS protocols and their attacks by malware & outside network services. These changes include support for IPV6 and legacy IPV4 devices on the same network. [...]

February 2014 – At the RSA 2014 conference in San Francisco, the theme of security had an underlying theme of mobile devices/thin clients connected to high speed and cloud based networks. These networks have been updated to the latest generation multicore servers which have enhanced throughput. As a result the edge of network devices in [...]

February 25, 2014, RSA Conference, San Francisco—Wave Systems (www.wave.com) is combining features of the Trusted Platform Module and some software to create functionality of a smart card without any physical devices. The package stores authentication credentials in TPM containers, so they can offer security comparable to that of a smart card or other physical media. [...]

February 25, 2014, San Francisco—Wade Baker from Verizon outlined the contents of the latest DBIR. The reporting and participating groups are now up to 50 contributors across the world and include forensics, vendors, various CERTs, police, and other investigative organizations. This report has been published since 2008 and has grown over time. Some of the [...]

February 25, 2014, RSA Conference, San Francisco—Dwayne Melancon from Tripwire presented the concept of games as the framework for security. Many of the user interfaces can use Diablo as the pattern for the UI. Game players depend upon various de facto standards for game interfaces. The games have methods and models that provide the elements [...]

February 24, 2014, RSA Conference, Trusted Computing Group, San Francisco—A panel considered the challenges in implementing TPM. Paul Roberts from The Security Ledger moderated the panel. Panelists were Monty Wiseman from Intel, Dustin Ingalls from Microsoft, and Gal Shpantzer from SANS. The industry has reached an inflection point in the technology, moving towards greater adoption [...]

February 24, 2014, RSA Conference, Trusted Computing Group, San Francisco—Jon Oltsik from the Enterprise Strategy Group moderated a panel focused on compliance and automation implementations. Panel members were Steve Whitlock from Boeing, Dan Griffin from JW Secure, and David Waltermire from NIST. In this time of security skill shortages and increased attack vectors, can standards [...]

September 2013, Intel Developer Forum, San Francisco—Bill Futral described the latest implementations of the Trusted Computing Group’s trusted platform module. The latest TPM specification 00.99 was released in August 2013. {edcs007} The TPM is an embedded microcontroller that stores keys, passwords, and certificates that is attached to a motherboard. The separate module is more secure [...]