Blog Posts Tagged with "Trusted Computing"


Is Security Broken? How I Propose to Fix It...

May 23, 2012 Added by:PCI Guru

In a true war, we would be investing in creating an offensive capability to go into cyber-battle with the enemy. And while there are discussions about having offensive capabilities, security professionals are still in a defensive posture protecting the organization...

Comments  (2)


Bionic M2M: Are Skin-Mounted M2M the Future of eHealth?

May 19, 2012 Added by:Danny Lieberman

As their computing capabilities develop, current trusted computing/security models will be inadequate for epidermal electronics devices and attention needs to be devoted as soon as possible in order to build a security model that will mitigate threats by malicious attackers...

Comments  (0)


UK Security Strategy to Focus on Trusted Computing

November 01, 2011 Added by:Headlines

"Building the most resilient cyber defenses in the world will not help if you are suffering from intellectual property theft. Trusted computing underpins security and can underpin growth, providing confidence in transactions, expanding markets and making them function more efficiently..."

Comments  (0)


NSA Conference Focused on Trusted Computing

October 10, 2011 Added by:Headlines

"Generally speaking, trusted computing technologies ensure that hardware and software behave as designed. These solutions prevent malicious computer attacks by combining commercially available, off-the-shelf IT tools. The bad guys are forced to break a sweat, and they still lose..."

Comments  (0)