Quantcast
Channel: Security Matters » Virtualization
Browsing all 9 articles
Browse latest View live

TCG Lays Out Blueprint for Trusted Virtual Computing

The newly released Virtualized Trusted Platform Architecture Specification is a key step in addressing the challenge of how to leverage the security value proposition of the Trusted Platform Module in...

View Article



Applied Virtualization: Securing Corporate Laptops for Personal Use

With all the hoopla in the last few years about “virtual machines” that provide Windows on a MAC, and multiple copies of Windows on a laptop, people have also seen that we could have a secure copy of...

View Article

Signs of Progress: An NSA Trusted Computing Conference Retrospective

[Editor’s Note: Neil Roiter submitted a series of observations from this year’s NSA Trusted Computing Conference. What follows is his retrospective.]   Year Two of the NSA Trusted Computing Conference...

View Article

From Virtualization to Self-Healing: What You Don’t Know about...

As their name suggests, self-encrypting drives (SEDs) are designed to encrypt all the data written to them. They clearly represent a better form of encryption – unlike software, they aren’t vulnerable...

View Article

Wave CEO Bill Solms Interview with Richard Stiennon – Virtual Smart Card,...

IT Harvest’s Richard Stiennon interviews Wave Systems Corp.’s CEO William (Bill) Solms. This segment touches on Wave’s Virtual Smart Card (VSC), as well as total cost of ownership.

View Article


A Modern Approach to Authentication – The Virtual Smart Card

Authentication plays a vital role in our daily routine. For example, most of us start our day by either logging into a laptop/tablet or unlocking a smartphone to access email, voicemail or other...

View Article

Image may be NSFW.
Clik here to view.

Wave Virtual Smart Card Named Gold Winner at Golden Bridge Awards

Wave Systems has been announced as Gold Winner in the “Information Technology (Software) Innovations” category at the 6th Annual Golden Bridge Awards. Wave won for Wave Virtual Smart Card 2.0, our new...

View Article

Trusted Cyber Collaboration Workshop Tackles Compliance, Complexity and Cost

By John Fitzgerald Members of the Trusted Computing Group (TCG) will come together to present a half-day session titled, “Where Trust Begins: A Look at Trusted Computing and Security Automation in the...

View Article


Wave Demos Products Alongside Partners at IT-SA

By Boudewijn Kiljan This year’s IT-SA conference was held in Nuremberg, Germany on October 7 – 9. It is, by far, the largest security conference in the DACH area (German-speaking countries in central...

View Article

Browsing all 9 articles
Browse latest View live




Latest Images