Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Denial of Service Attacks on the Banks were Avoidable
September 2012
http://blog.wave.com/thibadeau/september-2012-denial-of-service-attacks-on-the-banks-were-avoidable/
Retail customers of Bank of America, JPMorgan Chase, Wells Fargo, U.S. Bank, and PNC Bank were unable to get to their accounts for days in the last two weeks of September. There is no telling how many people missed payments, and Twitter was filled with tweets expressing frustration over the banks’ inability to serve their valued customers. Many banks suggested that their customers do their banking in person, although some also mentioned that their mobile phone applications would still work.
For the banks’ customers, this was an entirely avoidable outcome ...
My take on the offering: The deal is already done.
May 20, 2015: Planning to announce offering
May 21, 2015: Pricing and Terms of offering
May 22, 2015: Close of offering.
Most likely a single investor (or buy-in) by some third party.
The entire procedure is nothing but to comply with SEC rules.
We shall see...
Wave,and RSA...
... and nothing to announce?
It appears that Bill Solms is worth a heck of a lot less than SKS...
Solms hasn't delivered anything in 2 years... he's good with dilutions though!
Smooth talking and no follow up....
Fitzgerald, the CTO has left Wave... wonder how many more of Bill's great hirees will experience the same. In the meantime, all we can do is pray and slowly get rid of the shares ...
wavedreaner: DELL - Mitre
You wrote:
"BTW SKS and Dell ended their relationship with Wave cuz of the Mitre exploitation. Think about it and there is a fix in the mix so stay tuned if you have the stomach :)"
This statement couldn't be farther from reality...
Bill Solms is full of baloney! /e
Geoffrey Strongin...
It that, no longer on-line, Carnegie-Mellon presentation Geoffrey Stronging referenced the Wave ETS EMBASSY II system.
His name is...
Adam MCCallen
Executive Assistant to the CEO at Wave Systems Corp.
Alexandria, Virginia
http://www.atomicbobs.com/index.php?mode=read&id=898368
Windows XP falls below 25% market share while Windows 8.1 loses share for the first time
http://thenextweb.com/microsoft/2014/08/01/windows-xp-falls-25-market-share-windows-8-1-loses-share-first-time/
Despite support for Windows XP finally ending three months ago, the ancient OS has only now fallen below the 25 percent market share mark. To add to the bad news for Microsoft, after only nine full months of availability, its latest operating system version, Windows 8.1, has lost share for the first time.
The latest market share data from Net Applications shows that Windows 8 and Windows 8.1 lost a combined 0.06 percentage points (from 12.54 percent to 12.48 percent) between June and July. More specifically, Windows 8 slipped 0.01 percentage points (from 5.93 percent to 5.92 percent), while Windows 8.1 dipped 0.05 percentage points (from 6.61 percent to 6.56 percent).
There is no surprise that Windows 8, which saw its biggest gain in August at 2.01 percentage points and its biggest loss in November at 0.87 percentage points, continues to slip. The fact that Windows 8.1 has managed to lose share, however, may raise eyebrows. While it’s possible the dip is just a blip, it doesn’t bode well for Microsoft, especially given that the upgrade path from Windows 8 to Windows 8.1 is merely a free download away.
Meanwhile in July, Windows 7 managed to grab an additional 0.67 percentage points (from 50.55 percent to 51.22 percent). Windows 8 and Windows 8.1 usually do better combined than Windows 7 does, but some months the opposite happens, and the last three months haven’t been good ones for the new releases. Microsoft will likely one day struggle to woo users off Windows 7, just like it is currently trying to do with the headache that is Windows XP.
Speaking of earlier versions, Windows Vista managed to gain 0.10 percentage points (from 2.95 percent to 3.05 percent). Windows XP dropped 0.49 percentage points (from 25.31 percent to 24.82 percent). While it’s great to finally see it fall under the 25 percent mark, the drop is nowhere near as large as it should be.
In 2013, Windows lost share every month except for March, July, and November. So far in 2014, Windows has only slipped in January and April; it gained another 0.15 percentage points (from 91.53 percent to 91.68 percent) in July. OS X fell 0.09 percentage points (to 6.64 percent), while Linux slipped 0.06 percentage points (to 1.68 percent).
Net Applications uses data captured from 160 million unique visitors each month by monitoring some 40,000 websites for its clients. StatCounter is another popular service for watching market share moves; the company looks at 15 billion page views. To us, it makes more sense to keep track of users than of page views, but if you prefer the latter, the corresponding data is available here (mobile and desktop operating systems are combined).
brant_point: Thanks...
... and I like this quiet board... can put on record and file subjects that I think are interesting for the future... without having to argue with anybody... so much subjective information and opinions posted on the other boards...
Trusted Computing is here to stay... initial developments concluded... TC will take (is taking) off no matter who leads and spearheads the efforts from now on...
ViSCa - Virtualization of Smart Cards
https://itea3.org/project/result/download/6724/12015-ViSCa-ViSCa_profile_march-15.pdf
"... Theoretically, any device which can provide the three key properties of Smart Cards (non-exportability, isolated cryptography, and anti-hammering) can be commissioned as a VSC, though the virtual smart card platform is currently limited to the use of the Trusted Platform Module (TPM) chip contained in most modern PCs. Smart Cards as a Service (SCaaS), as proposed by ViSCa, will be carried out in the cloud, giving the user the flexibility to access the Virtual Machine that substitutes the traditional smart cards from different host devices and allows multiple user sessions ..."
New ERAS Bochure 2014
http://www.ciosummits.com/DATA_SHEET_ERAS_7_2014.pdf
Wave and Bell ID Partner to Combat Online Payment Fraud
http://www.bellid.com/company/press_releases/wave-bell-id-partner-combat-online-payment-fraud/?utm_source=Twitter&utm_medium=Tweet&utm_campaign=Bell%20ID%20Wave%20PR
31 July 2014
EMV card-present transactions enabled for E-Commerce by integrating TPM technology.
Wave Systems Corp. (NASDAQ: WAVX) announced it is partnering with chip lifecycle management solutions company, Bell ID, to offer a joint solution aimed at reducing online payment fraud. The solution will be marketed primarily to card issuing banks, as well as online merchants, governments, and enterprises worldwide.
Using Bell ID’s Trusted Service Manager and Secure Element in The Cloud (SEiTC) server, alongside Wave’s ERAS for TPM management and Wave’s endpoint identity and monitoring expertise, the combined offering provides robust protection for transactions and stored payments. The companies have executed a letter of intent and anticipate the signing of a definitive agreement in August.
The incident rate of card-not-present (CNP) fraud has been growing steadily over the past several years. According to a recent FICO Banking Analytics Blog, CNP fraud now accounts for close to half of all credit card fraud. Countries that have already adopted the EMV® card specification have seen CNP fraud rates increase. In the United States, CNP fraud is expected to rise significantly over the next eighteen months, as the EMV standard is put into effect. The EMV directive, which implements a global standard for a secure chip-based payment application, will make merchants liable for any fraud resulting from transactions on systems that are not EMV-capable.
“Wave’s robust product portfolio is very complementary toBell ID’s strongly positioned solution set in the financial services market,” said Bill Solms, CEO, Wave Systems. “We see the EMV transition creating high demand for more secure transaction capabilities, and are confident that together we can provide financial institutions with a comprehensive solution for payment authorization and storage.”
“Bell ID has been a pioneer in developing and delivering cloud-based payment platforms,”adds Pat Curran, Executive Chairman at Bell ID. “We also have extensive experience in delivering EMV solutions globally and have witnessed fraud transition online as point-of-sale terminals in face-to-face transactions become more secure. We are therefore delighted to extend our offering with Wave to provide a secure online transaction and storage payment solution, which will mitigate against an expected rise in online fraud and provide a trusted link between device identity and internet services.”
Securing the Client for Cloud Computing SecureView ™
http://www.cloudcomputingevent.net/wp-content/uploads/2014/05/Ortman-TTC_Cloud_sp14.pdf
The endpoint is one of the weakest security links of the Cloud
TPM and Virtual SmartCard (VSC) coming to a smartphone near you soon!
Enterprise finally embraces TPM-based security
http://www.computerweekly.com/news/2240225813/Analyis-Enterprise-finally-embraces-TPM-based-security
Wednesday 30 July 2014
By Warwick Ashford
Enterprises are finally embracing security systems based on trusted platform module (TPM) chips built into computing devices, but why has it taken so long?
Since 2006, many computing devices have included TPM chips, but enterprises have been slow to embrace the technology in their information security strategies. However, in 2012 the Trusted Computing Group (TCG), which published the TPM specification, claimed the technology had reached tipping point.
Steven Sprague, a founding-member of the TCG, told Computer weekly that claim was backed up because the number of PCs with TPM chips has crossed the 600 million mark. He predicted further expansion of TPM use in Windows 8 would also drive the first mainstream adoption of TPM and a much broader spectrum of use. This prediction has proven to be correct, according to Bill Solms, who succeeded Sprague as chief executive of Wave Systems in October 2013.
“The TPM’s time has come,” Solms told Computer Weekly, driven by the fact that individuals and companies are now far more aware of the need to defend against cyber threats and that mature TPM-based technologies are available to help address that need. “There is a much greater awareness and understanding at a much broader level of cyber threats among business professionals and the general public than there was just two years ago,” he said.
In that time, Solms said cyber threats have gone from being an IT security issue to a business issue with high-profile data breaches in recent months contributing to an “acute awareness” in many organisations. “This has put cyber security on the agenda of the board of directors who want to know what their information security teams are doing to ensure they are not the victim of the next breach,” he said.
Solms admits this has boosted interest in TPM-based systems, but said companies are much more interested in what they can do in terms of securing the enterprise, rather than underlying technology. This in turn has prompted a change in the go-to-market strategy at Wave Systems. Rather than trying to educate customers about TPMs, the company is focusing on solving specific security problems.
“Based on my experience at Microsoft and Oracle, it is vital to ensure you understand the customers’ needs and present the combination of products and services that solves that problem. Adoption of TPM systems is being driven by use cases such as TPM-based virtual smart cards that can protect companies from attackers using stolen credentials from accessing their systems,” he said.
Because TPM-based systems combine user credentials with the device ID, user credentials will not work if they are being used on an unknown computing device. “Stolen credentials are useless to attackers because they do not have access to the device or devices that have been associated with the credentials,” said Solms.
“Virtual smart cards are there to provide strong authentication which means it is extremely difficult for attackers to impersonate legitimate users even if attackers are inside corporate systems,” he said. Wave Systems, which considers itself on the cutting edge of TPM management systems, invested early on in its TPM-based virtual smart card system the works with Windows 7, 8 and 8.1.
“By using the TPM chip in computing devices, virtual smartcards offer the same additional security as physical tokens but at a 50% to 75% lower cost because they cannot be stolen or lost,” said Solms. Much of the savings come from the fact that most large companies expect to replace about a third of their physical smartcards or tokens every year.
“Virtual smartcards also work with applications and access controls that have been set up to work with physical smartcards, therefore no re-engineering is required,” he said. The benefit of using TPM-based smartcards is that. once authenticated to the TPM in the computing device, users can access all applications and systems using biometric systems like fingerprint scanners.
What if employees use more than one device or cannot use their main device? Although the authentication relies on the TPM of a specific device, the Wave Systems virtual smartcard allows users to associate more than one device with their identity. In office situations where a single device may be used by several employees, the system also allows multiple identities to be associated with a single device. “And if a user’s device fails or is lost or stolen, setting up access from a new device can be done quickly and easily by system administrators,” said Solms.
TPM-based technology is well established, he said, and gaining traction due to a greater desire to protect IT endpoints, even though companies are not necessarily aware of the underlying technology. But at the same time, Solms said awareness of TPM-based systems is growing because of the greater TPM support provided by Microsoft and other suppliers. “For all these reasons the moment has come for TPM-based technologies, and I believe they are now perfectly positioned to make a big jump in adoption,” he said.
Given the growing demand for security at all levels including the end point, the widening deployment of TPM-enabled devices, increased support by Windows 8 and 8.1, and the fact that TPM is a security requirement for new kit for the US government and department of defence; it could be argued that TPM is coming of age and will now develop into maturity after being a nascent technology for so long.
Wave Systems Introduces Virtual Smart Card 2.0
July 28, 2014
By Clayton Hamshar
http://www.mobilecommerceinsider.com/topics/mobilecommerceinsider/articles/384909-wave-systems-introduces-virtual-smart-card-20.htm
In an era of hackers becoming more common and skillful, breakthroughs in security technology are essential. Wave Systems has brought the world the latest of these advancements, a virtual smart card that replaces traditional smart card technology.
The use of a Wave Virtual Smart Card 2.0 brings all the security benefits of a smart card without the need for a physical object, which can be lost or stolen. From a centralized management server, Wave provisions virtual smart cards based on a Trusted Platform Module (TPM) security chip to a user’s device, which stores a unique device identity that is associated with all of that user’s devices. When a user enters their credentials, they must be associated with the TPM identity in order to gain access. In other words, a hacker would have to know the user’s credentials and use their device with the right TPM identity in order to be successful.
With this solution, a company’s IT department can remotely create and delete virtual smart cards, provide helpdesk-assisted recovery, configure PIN and card policies, view the status of virtual smart cards and enrolled certificates and generate reports for compliance. They are supported on laptops, desktops and tablets with TPM 1.2 or TPM 2.0.
The new development greatly enhances security as there is nothing physical that a hacker can steal, except the device itself, which although possible is significantly less likely and the hacker would still need the user’s credentials. In addition, a device is going to be missed much faster, and is much less likely to be lost. The solution all but eliminates hacker attacks from remote locations and makes the job of a physical intruder much more difficult.
Virtual smart card technology is also much cheaper. Many companies report that as many as 30% of physical smart cards must be replaced each year, and Wave says the entire solution will cost up to 50% of that system in addition to saving those replacement costs.
The Wave Virtual Smart Card 2.0 is available on Windows 7, Windows 8 and Windows 8.1 after a launch on July 22, 2014.
dig: ERAS...
There are exactly 2 different possibilities to manage apps:
1. Locally, via ESC with hands-on
2. Remotely/centrally, via ERAS with NO hands-on.
This is valid for the entire feature set.
dig: There have always been 2 components to Wave's offering.
1. The client software (ESC) that allows local management of most features.
2. But the ESC also acts as the local client communication element of/with ERAS
VSC can not be considered an ERAS lite.
VSC is a capabiity/feature addition. It is, obviously, a software instantiation of a smart card using the Microsoft SC overlays. In Windows Vista and Windows 7 these overlays were written by Wave.
Like all other components VSC can be managed locally in the ESC or centrally with ERAS or Wave Cloud (for SEDs). Of course, and as you correctly state, mass deployment begs for ERAS... and that is valid for all features.
dig: agreed...
I have never thought that DMI is only here to help us with installing big projects (manpower). I would expect DMI to be a partner in marketing and sales. Should be a valuable reseller/integrator.
dig: It really is...
a useless discussion... so many things you and I do not know... but the last thing I saw was that BP deployed SEDs and ERAS globally with 100K plus seats... can't be that bad after all...
In the meantime the industry has settled on Opal 2 ... also lot's of progress with the devices...
Cecilia Smart
Security and Encryption Consultant
BP
September 2012 – February 2014 (1 year 6 months)Stockley Park, Uxbridge
Project Consultant for Global Deployment of Disk Encryption Software (Wave) to 100,000+ Laptops Globally (US, EMEA, Australia, Far East & South America)
dig space: BP deal...
1. First time deployment of an IT system always brings with it "discoveries".
2. Several of the influential BP engineers are today working with Wave.
3. Software is a beast and it needs to be tamed at the beginning. Always.
4. While interesting and "sounding smart", blaming those that brought it first to market is kind of missing the point... especially when one doesn't know the background.
dig: VSC, usernames and passwords
A TPM can be configured for several users/identities... each registered user can then log-in with his own PIN and/or biometric...
barge: Yes, further clarification would be appreciated... unfortunately 99+ % of all folks never give the complete background...
barge: GG
My statement was based on the GG answer here:
GG wrote:
"I am still on the board of Wave and sincerely support it as a turnaround story under the resourceful and inspirational leadership of Bill Solms. The need for its technology is greater than ever. With a strong military background and experience at Microsoft and Oracle, Solms is focusing the company on the "virtual smart card" as a more attractive way to sell Trusted Platform Modules. We all devoutly hope the new approach works. I have been investing in Wave, sincerely, for more than 20 years. Virtually all my family owns it. None of us have ever sold a share.
I am also on the board of Rivetz, which is creating a hardware wallet for bitcoin. Steven Sprague is the genius who is responsible for all of Wave's technology. The board lost patience and fired him after several years of poor financial performance. He started a new company under a strong non-compete clause. He is definitely not competing with Wave. Rivetz cannot even use TPMs; hence the Trustonic link with ARM."
http://tinyurl.com/k4vqvv3
barge: A TPM is a TPM is an MTM no matter what type nor where it is loacated. TPM and TrustZone/TEE are complementary and, for best security, it needs both...
It appears that Wave has or wants to keep their hands on all TPMs hence the non-use of TPMs by Rivetz...
See also:
How does the Trusted Execution Environment (TEE) compare to Trusted Platform Mobile (TPM)?
There are two main components of platform security:
1. Trusted Execution Environment
2. Trusted Platform Module
They work in tandem; one is not designed as a replacement of the other. As an analogy, TEE is the bulletproof safe, while TPM is the 128-digit combination lock for the safe. Both are needed to ensure the safe is protected.
TEE encompasses the following elements:
1. A protected or secure execution of critical applications in a virtualized environment
2. Safe and secure boot ensures all system software components are in a known and "trusted" state before launching.
TPM provides the following services:
1. Remote attestation: External services can verify that the system has not been altered or tampered with by using a hash of both system state. The verification is performed on both hardware and software. It is necessary to check that the system is not compromised before executing sensitive processes.
2. Binding: Encryption of data using a unique RSA key that is burned into the chip when the chip is manufactured.
3. Sealing: A feature that ensures that data isn't accessed or decrypted when the system is in normal operation. It ensures that applications cannot access protected data when the system is in a sealed mode. But it can also allow legitimate applications to access protected data.
Arguments were made that TPM is not necessary if the TEE is robust. Some vendors have chosen not to use external TPM and store the keys and protected data in a TEE-only addressable area. TEE can help with Binding and Sealing. ISO standards suggest using a full-fledged TPM. External TPM could be very useful in coordinating between several masters and other complex systems. On the other hand, solutions that only rely on TPM are very vulnerable for execution and boot attacks. It is easy to override the application run states and circumvent TPM.
http://www.openvirtualization.org/open-source-arm-trustzone.html
All Windows Phone 8.1 devices include a TPM
"… Table 1. Common Security Features in Current Windows Operating Systems Security feature Description Unified Extensible Firmware Interface (UEFI) UEFI is a standard firmware interface for devices and designed to replace BIOS. For more information about UEFI, see the UEFI sections in the “Trustworthy hardware” and “Boot process” sections later in this guide. Trusted Platform Module (TPM) TPM is a standards-based crypto-processor designed to help secure data, enable authentication, and ensure device integrity. All current Windows operating systems support TPM. For more information about this technology, see the TPM section in “Trustworthy hardware” and “Certificate authentication” later in this guide…
(SKIPPAGE)
All Windows Phone 8.1 devices include a TPM“… Virtual smart cards An important security improvement in Windows Phone 8.1 is the support for virtual smart cards, which are based on the industry-standard smart card solution. Virtual smart cards emulate the functionality of traditional smart cards but use the TPM processor on devices rather than requiring the use of a separate physical smart card and reader. Virtual smart cards enable users to provide two-factor authentication (“2FA“) when accessing resources and work just like their physical smart card counterparts. In many instances, users can use the same virtual smart card on Windows Phone as they are already using for other Windows devices. Users can use virtual smart cards for secure browsing and also for S/MIME signing and encrypting of email messages…”
http://download.microsoft.com/download/B/9/A/B9A00269-28D5-4ACA-9E8E-E2E722B35A7D/Windows-Phone-8-1-Security-Overview.pdf
Rivetz... non competing clause
I can not comment on any non competing clause.... but what seems to be the case is that scrambls and Knowds fully REMAIN the property of Wave. The company appears to have no intensios whatsoever, to divest of scrambls nor Knowds.
Knowds is a core element of the technologies used for Wave's NSTIC projects.
It appears that Rivetz is singling out particular applications leveraging Wave technologies. Anybody and any entity is free to license Wave technologies.
trustcousa
+/- $50.00 a seat
Correction...
Of course, I meant to say David Collins... and not Tim Collins:
barge... Bill Solms...
I have met with Mr. Solms in Orlando, FL in September. He struck me as a straight forward person.
That said, what I need to see from him is his understanding of the Trusted Computing space, his vision and where he wants to take the company. These are all open points.
Regarding David Collins, I have a difficult time understanding him; His notion to bash Steven openly disturbs me a lot.
barge... Bill Solms...
I have met with Mr. Solms in Orlando, FL in September. He struck me as a straight forward person.
That said, what I need to see from him is his understanding of the Trusted Computing space, his vision and where he wants to take the company. These are all open points.
Regarding Tim Collins, I have a difficult time understanding him; His notion to bash Steven openly disturbs me a lot.
tkc... why the secrecy on the poster?
All I said was:
Amazing that the new management has, so far, not been able to announce even one single substantial order in Q4/13... a quarter that is historically good for IT orders...
The honeymoon is slowly coming to an end....
8K of September 20, 2013
1. Wave cut a deal with a company - likely an OEM - to develop a product/software for this company.
2. As part of the deal, Wave acquires Intellectual Property from this company. Wave pays for this IP with 372,578 WAVX shares.
Item 3.02 Unregistered Sales of Equity Securities.
On September 16, 2013, the Company entered into a software development and license agreement (the “License Agreement”) with a counterparty (the “Licensor”), pursuant to which the Company acquired a license of certain software and related intellectual property rights from the Licensor. Upon execution of the License Agreement, and as part of the consideration payable by the Company under the License Agreement, the Company issued to the Licensor 372,578 unregistered shares of the Company’s Class A common stock. The issuance of such shares was exempt from registration under the Securities Act of 1933, as amended, in reliance on Section 4(2) thereof.
http://tinyurl.com/nzjpc8f
TCC Keynote - Richard Stiennon: A Call To Arms
Richard Stiennon in his TCC presentation of September 12, 2013
On the "Surveillance State", which Mr.Stiennon now places at the top of the threat hierarchy:
"This new threat to Confidentiality, Integrity, Availability, Privacy, Commerce, Democracy,
and Stability, greater than all others, is what Trusted Computing was built to counter.
Let's fix this, before it is too late."
http://www.slideshare.net/stiennon/stiennon-keynote
Richard Stiennon
IT Harvest
http://it-harvest.com/
Here the English version of the BSI paper...
http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/trusted_computing_eng.pdf?__blob=publicationFile
German BSI Whitepapper from August 2012
http://tinyurl.com/bunyod7
Here a link to the German BSI and its Trusted Computing "Ëckpunkpapier" (loose translation: "Whitepaper")
Close scrutiny of this "Eckpunktpapier" - sorry, it's only available in German - indeed points to a main issue for the BSI: That the TPM be "opt-in/opt-out", as stated in your referenced Microsoft response. And that is certainly already possible.
There are many more points listed, but, it seems to me, all points are either addressed by the TCG or can be complied to.
TCG Members to Talk Security Implementation and Evolution at Trusted Computing Conference
August 26, 2013 11:30 AM
PORTLAND, Ore.--(BUSINESS WIRE)--Trusted Computing Group (TCG) members will provide attendees of the Trusted Computing Conference, Sept. 9-12, with a look at the billions of trusted endpoints and fresh ways to use available TCG technologies to solve emerging and current security problems.
“Compliant and Connected: Building Herd Immunity in Our Networks.”
TCG president Joerg Borchert, Infineon, will provide the keynote “Beyond One Billion Endpoints - A Short History of IT Security's Most Important Concept.” Borchert will talk about the many endpoints protected with TCG standards, then discuss new developments to match the ever-increasing speed and kinds of attacks. Users will hear about Trusted Computing in action and how TCG works with governments and standards groups worldwide.
Steve Hanna, Juniper Networks and co-chair of TCG’s Trusted Network Connect (TNC) Work Group, will discuss “Practical Security Automation With Open Standards.” His talk will address how current and emerging security automation standards and architectures from TCG and IETF are being used to build automated defense systems and learn what’s coming next.
Lisa Lorenzin, Juniper Networks and TCG TNC Work Group, will present “Compliant and Connected: Building Herd Immunity in Our Networks.” Lorenzin will explain how TCG offers a framework for multi-vendor, interoperable endpoint health and state reports to determine the compliance status of any type of endpoint.
Wondering about securing the growing body of non-PC connected devices? The panel “The Wild Wild Worldwide Web: Securing the Growing Internet of Things” will provide some answers. Josef Allen, United States Air Force, will join security Analyst Victor Wheatman and TCG invited expert, and Stacy Cannady, Cisco, to look at the growing threats to the many Internet-connected devices that are vulnerable to attacks and malware.
Other sessions will address SEDs, the TPM and the evolution of Trusted Computing.
The Trusted Computing Conference, to be held Sept. 9-12 in Orlando, Fla., brings together experts in the field of information security to discuss, explore, promote and emphasize the critical need for a standards-based approach. The industry’s leading individuals and businesses will participate in this three-day conference and trade show that will unify the standards-based trusted computing message and explore its practical uses. TCG is a Diamond Sponsor of the event. A complete agenda can be found at http://trustedcomputingconference.com.
Trusted Computing Group develops, defines and promotes open, vendor-neutral, global industry standards based on a hardware root of trust, for interoperable trusted computing platforms. Billions of endpoints use TCG standards to ensure system integrity, protect networks and secure data. For more information, see www.trustedcomputinggroup.org and on Twitter and LinkedIn.
Brands and trademarks are the property of their respective owners.
Tweet this: @TrustedComputin members to talk future, using standards for security TCC @TCC2013tcc, http://bit.ly/15ltVrh
Contacts
PR Works, Inc.
Anne Price, 602-840-6495
anne@prworksonline.com
Twitter: @TrustedComputin