I had the privilege of participating on a panel at the Cybersecurity Innovation Forum (CIF) in Washington, DC this week. Sponsored by NIST, CIF is a fantastic event that brings together many government and industry security leaders, experts and practitioners to discuss challenges, innovative solutions and research in trusted computing, security automation, and information sharing.
My panel titled, “Device ID and Health” included Lisa Lorenzin of Pulse Secure and Steve Hanna of Infineon Technologies, and it was moderated Jessica Fitzgerald-McKay of the Information Assurance Directorate of NSA.
Because I’ve participated in the Trusted Computing Group (TCG) and have given presentations on Trusted Platform Modules (TPM), I get a lot of questions about the comparison between TPMs against its alternatives – many questions revolve around attestation, roots of trust, and other such concepts that are interesting to discuss, but require a fair amount of background to communicate effectively. Quite frankly, from a TPM benefit perspective the lowest hanging fruit and the easiest to describe is to just use the TPM to protect and use cryptographic keys for all of the normal applications that we use today – and especially easy to use for authentication applications. So there you have it – something simple and easy to understand, easy to use, and easy to manage.
Wave Systems has earned yet another award for its Virtual Smart Card 2.0 (VSC) solution, this time taking home the gold in the ‘Hot Technologies’ category for the Network Products Guide 10th Annual 2015 Hot Companies and Best Products Awards.
On the second anniversary of the now historic and infamous Edward Snowden NSA leak, and in the wake of yet another mega security breach aimed at the U.S. government, Wave Systems’ President and CEO, Bill Solms, offers his perspective in a recently published, high-profile op-ed piece in the Huffington Post.
The hack that resulted in the theft of information on 4 million government employees didn’t need to happen. We had plenty of warning and next to nothing was done.
Last Friday marked the second anniversary of Edward Snowden’s infamous NSA leaks. Those leaks not only exposed major government data collection efforts on which much debate has already been focused, but they also exposed some fundamentally troubling lapses in cybersecurity practices at one of our most sensitive government agencies. Whether you view him as a martyr, a traitor, or possibly both, Snowden’s exploits did more than anyone else to call our attention to the sorry state of data protection in this country. The NSA found itself reeling from a massive breach perpetrated not a by an enemy state but by a talented junior analyst with a mission to bring the system down. It was the loudest warning shot in cybersecurity history and unfortunately our government didn’t listen…or if they listened then they failed to act decisively. That is potentially even more troubling.
From 2nd to the 4th June, the information security world will once again converge on London for the 20th instalment of Infosecurity Europe – the IT security industry’s de facto meeting place to engage, network and communicate.
While thousands will assemble in London at Infosecurity Europe to talk hot topics, trends and emerging products, Wave Systems will do what it does best at the show – we’ll demo our cutting-edge security products, we’ll highlight their features and we’ll show attendees how they work through comprehensive demonstrations.