Saturday, October 10th, 2015

September 2015 – The 2015 TechCrunch Disrupt event was heavily dominated by social media and mobile apps leveraging the open source and vendor library environments that are present for Linux, Windows, Android and iOS devices. The applications covered most of the sensors and interfaces in mobile devices – microphones, speakers, motion, GPS, and video. There [...]

August 20, 2015, Intel Developer Forum, San Francisco—Abhilasha Bhargav-Spantzel, security architect at Intel presented concepts on identity protection technologies. The basis for many data breaches is compromised identity. One of the primary problems for users and IT is passwords. Most passwords are easily cracked, key-logged, phished, and intercepted, making them a high security risk. Password [...]

August 20, 2015, Intel Developer Forum, San Francisco—Nitin Saragdhar from the Intel security group talked about biometric authentication in a trusted execution environment. The growing number of damaging exploits and data breaches is raising concerns, but users don’t want to have more and higher complexity passwords. Users need to be authenticated t ensure that all [...]

August 2015 – Securonix offers a security analytics cybersecurity suite that has six major components: insider threat detection, application threat and risk monitoring, identity and access intelligence, DLP intelligence, privileged account security intelligence, and SIEM Intelligence. Using these six features Securonix is able to provide enterprise level capabilities out of the box with their system. [...]

August 2015 – enSilo is an information security company that focuses solely on exfiltration prevention. They operate under the assumption that your system already is or will be infiltrated and they prevent the attacker from being able to steal any information once they’re inside. Some enterprises get thousands or even tens of thousands of notifications [...]

 June 2015 – The Linley group held their first event focusing on IOT and the issues and breakthroughs in the technology and the market. The three topics addressed by the conferne were processor design for IOT applications, security at the IP and product level and finally the key to battery operated mobile design energy efficiency. [...]

June 2015 – At the E3 Expo, connectivity was a major factor on the floor. The new consoles and platforms are focusing on multiplayer modes and on-line experiences over and above the single download and play single player mode. This connected format has several incarnations based on the developer and the game type. Some send [...]

May 2015 – One of the major sessions at the Connections conference this year was on the topic of wearables and focused on smart watches. The panel for the discussion consisted of speakers from Misfit, Mediatek, Peq, Reemo and Plantronics. In the wearables segment, the highest growth is in health and fitness. Smart watches have [...]

May 21, 2015, Imagination Summit, Santa Clara, CA—Tony King-Smith from Imagination talked about the long-term problems for security in embedded systems. The results of a breach can be very sinister and difficult to eradicate. Lately, the world has seen many new attack vectors like “heart bleed” and the IoT will have high consequences for consumers [...]

May 21, 2015, Imagination Summit, Santa Clara, CA—Art Swift from the prpl foundation talked about a new frontier in information security and the need to move to hardware-based security for SoCs. The founding member of the foundation is Imagination. The security industry is facing many new challenges, many related to the users’ inertia in updating [...]