Blog Posts Tagged with "Trusted Computing"

Fc152e73692bc3c934d248f639d9e963

Is Security Broken? How I Propose to Fix It...

May 23, 2012 Added by:PCI Guru

In a true war, we would be investing in creating an offensive capability to go into cyber-battle with the enemy. And while there are discussions about having offensive capabilities, security professionals are still in a defensive posture protecting the organization...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Bionic M2M: Are Skin-Mounted M2M the Future of eHealth?

May 19, 2012 Added by:Danny Lieberman

As their computing capabilities develop, current trusted computing/security models will be inadequate for epidermal electronics devices and attention needs to be devoted as soon as possible in order to build a security model that will mitigate threats by malicious attackers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

UK Security Strategy to Focus on Trusted Computing

November 01, 2011 Added by:Headlines

"Building the most resilient cyber defenses in the world will not help if you are suffering from intellectual property theft. Trusted computing underpins security and can underpin growth, providing confidence in transactions, expanding markets and making them function more efficiently..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Conference Focused on Trusted Computing

October 10, 2011 Added by:Headlines

"Generally speaking, trusted computing technologies ensure that hardware and software behave as designed. These solutions prevent malicious computer attacks by combining commercially available, off-the-shelf IT tools. The bad guys are forced to break a sweat, and they still lose..."

Comments  (0)