Tuesday, November 24th, 2015

November 11, 2015, ARM TechCon, Santa Clara, CA—Henk Pruim from Inside Secure described the issues and challenges of the premium content industry. The various delivery options are in a flux as viewers move from tethered connections to IP delivery technologies. IP and Internet video are growing at a very high rate. Various pundits are forecasting [...]

November 10, 2015, ARM Techcon, Santa Clara, CA—Sean Newton from ST Microelectronics provided insights into the need for various types of security in designs. The basics of security have to be modified for microcontroller-class devices to be most effective with the limited resources available. The headline events about hacks and breaches into data and devices [...]

November 11, 2015, ARM Techcon, Santa Clara, CA—Danny Kaye from Twentieth Century Fox Home Entertainment talked about changes in the distribution and delivery of the various content from the movie studios. The underlying business models are changing as consumers change their buying and viewing habits. The consumer base for cinematic content is already moving towards [...]

November 11, 2015, ARM Techcon, Santa Clara, CA—Simon Segars from ARM described the changes in mindset and products that will be necessary for trust and security in a connected world. The advances in technology enable more devices to share data magnifying the conflict between privacy and the use of shared data. The new world needs [...]

November 10, 2015, ARM TechCon, Santa Clara, CA—Mike Muller CTO from ARM talked about the changes in semiconductors over the past 25 years. Not only has transistor density increased according to Moore’s law, but so have functionality and capabilities. The change have also gone into other categories, like data discs. A CD has row and [...]

September 2015 – The 2015 TechCrunch Disrupt event was heavily dominated by social media and mobile apps leveraging the open source and vendor library environments that are present for Linux, Windows, Android and iOS devices. The applications covered most of the sensors and interfaces in mobile devices – microphones, speakers, motion, GPS, and video. There [...]

August 20, 2015, Intel Developer Forum, San Francisco—Abhilasha Bhargav-Spantzel, security architect at Intel presented concepts on identity protection technologies. The basis for many data breaches is compromised identity. One of the primary problems for users and IT is passwords. Most passwords are easily cracked, key-logged, phished, and intercepted, making them a high security risk. Password [...]

August 20, 2015, Intel Developer Forum, San Francisco—Nitin Saragdhar from the Intel security group talked about biometric authentication in a trusted execution environment. The growing number of damaging exploits and data breaches is raising concerns, but users don’t want to have more and higher complexity passwords. Users need to be authenticated t ensure that all [...]

August 2015 – Securonix offers a security analytics cybersecurity suite that has six major components: insider threat detection, application threat and risk monitoring, identity and access intelligence, DLP intelligence, privileged account security intelligence, and SIEM Intelligence. Using these six features Securonix is able to provide enterprise level capabilities out of the box with their system. [...]

August 2015 – enSilo is an information security company that focuses solely on exfiltration prevention. They operate under the assumption that your system already is or will be infiltrated and they prevent the attacker from being able to steal any information once they’re inside. Some enterprises get thousands or even tens of thousands of notifications [...]