• November 27, 2013

    Report to President Obama says feds 'rarely follow' security best practices

    The council recommends that the feds retire within two years "unsupported and insecure operating systems," including Windows XP, and move to new versions of Windows, Linux, and Mac OS, as well as push for "universal adoption of the Trusted Platform Module (TPM) microchip for all systems, including smartphones and tablets." It also calls for the feds to adopt the most secure browsers, make available voluntary national identity technology, but make it mandatory for federal users.
     

    Read More...

  • November 22, 2013

    Wave Systems introduces virtual smartcard as alternative to external tokens for authenticating users and devices to a network

    Wave Systems Corp., which has recently become a sponsor of the Government Security News 2013 homeland security awards program, brings a unique approach to the challenge of authenticating a user to a computer network run by a government agency or large commercial enterprise.

    Read More...

  • November 13, 2013

    Behind the career: William Solms

    When William Solms was a boy, he would watch as his Army stepfather and fellow soldiers would jump out of planes and lead teams. They became role models to Solms and he applied to West Point and graduated in 1985. Solms started out as an a paratrooper and an Apache helicopter pilot. He worked his way through the ranks and landed at the Pentagon before leaving the Army to work in business. He started off as an account executive at Microsoft and eventually moved to Oracle to lead a sales team before coming to Wave Systems.

     

    Read More...

  • November 8, 2013

    New at the top: Wave System’s new CEO William Solms learns to lead in the IT world

    Interview with William Solms

    Position:  Chief executive of Wave Systems, a cybersecurity company.

    Career highlights:  Vice president of North American sales, Wave Systems; director of the U.S. federal sales team, Oracle on Demand; sales executive, Microsoft; member, the Joint Staff at the Pentagon; chief of Joint, Interagency and Multinational Training for the Army; executive officer, 6th U.S. Cavalry Brigade in Korea; operations officer, Apache Attack Helicopter Squadron.

    Read More...

  • September 25, 2013

    Wave Brings Encryption Management to the Cloud

    Simply having an encrypted device is not enough to satisfy regulatory compliance requirements, enterprises need to also be able to manage encrypted devices. It's a challenge that encryption management vendor Wave Systems is tackling with its Wave Cloud solution.

    Wave Systems this week launched its Wave Cloud 2014 solution enabling enterprises to manage self-encrypting drives (SED) as well as Windows BitLocker and Mac FileVault devices.

    Read More...

  • September 25, 2013

    Solving the TPM Uptake Challenge

    TPM is a device on the motherboard that stores keys and ensures the integrity of a given device. It verifies the identity of the device and of the user, and thus provides the root of trust upon which to base secure operating systems and applications. TPM-based applications include things like virtual smart cards, which provide an on-board authentication mechanism for signing into network resources and applications, with no password required.

    Read More...

  • September 24, 2013

    Why A Hardware Root Of Trust Matters For Mobile

    As the IT industry grapples with the security implications of mobile devices, some experts believe that one of the most important first steps it can take is to stop getting caught up in irrelevancies.

    Read More...

  • September 24, 2013

    Wave Cloud Adds Encryption Management Support for FileVault and BitLocker

    Wave Cloud 2014 now enables enterprises to manage self-encrypting drives (SEDs), along with Windows BitLocker and Apple’s FileVault management, all in the cloud and through a single console.

    Read More...

  • September 20, 2013

    Podcast: Securing The Internet of Things

    One of the most vexing problems created by the fast-evolving Internet of Things is how to secure the massive trove of data that is transmitted and then stored by smart devices such as automobiles, consumer and household electronics and personal devices.

    Read More...

  • September 12, 2013

    Defining and Selling Trusted Computing

    In a discussion chaired Derek Brink, VP and research fellow from the Aberdeen Group, the panel provided a brief crash course on the concept of ‘trusted computing’ and examined reasons why industry has been slow to adopt the TCG’s hardware-based security standards.

    There is the perception that the computing ecosystem is not a trusted one, Brink commented from the outset, and then turned to fellow panelist Michael Willet, a storage security specialist from TCG member Samsung, to explain precisely what a trusted computing ecosystem entails.

    Read More...

  • September 10, 2013

    NSA Set To Approve TPM For Government Use

    Speaking at the Trusted Computing Conference in Orlando Monday afternoon, Debora Plunkett, Director of Information Assurance for the NSA, announced that she is preparing to sign an Information Assurance Advisory that permits the purchase of Trusted Computing components for National Security Systems. This is great news for the small community that is the Trusted Computing Group and the vendors who have worked for over a decade to provide technology for hardware based cryptography, key repositories, self encrypting drives, and device authentication.

    Read More...

  • September 10, 2013

    NSA to Recommend TPM Standard for Government Use

    Debora Plunkett, director of the NSA’s Information Assurance Directorate, told the audience at the Trusted Computing Conference in Orlando that she plans to sign the advisory later this week, signaling the NSA’s endorsement of the TPM specification.

    Read More...

  • September 4, 2013

    Dropbox Cloud Storage Platform Hacked? Not So Fast

    Dropbox is a widely used cloud-based storage platform that is now the target of security researcher scrutiny, as user data privacy is being called into question. A pair of researchers at the USENIX security conference in August released a white paper in which they describe methods for attacking Dropbox and obtaining user data.

    Read More...

  • August 13, 2013

    Silent Circle, Lavabit End Secure Email Services Due to Surveillance Concerns

    The fallout from the controversy regarding the NSA's electronic surveillance programs has caused a firm providing encrypted email services to shutter its doors.

    Silent Circle, which offers encryption services designed to shield everything from text messages to phone calls, says the decision to end its Silent Mail service reflects concerns regarding increased surveillance targeting users. With the move, it joins a company called Lavabit that suspended its operations last week as well due to concerns about government surveillance on the Internet.

    Read More...

  • July 25, 2013

    The Scandal of Computer Security

    The U.S. has become a digital civilization. Our industry, defense, medical care, entertainment, and communications all largely rely on information technology. In recent months, it has become increasingly evident that this digital civilization is under attack and that its protective strategies are failing.

    Everywhere in the news are accounts of computer security hacks. Targets range from the New York Times, which was hit with 45 pieces of undetected malware in three months, to the Financial Times’ corrupted email system.

    Read More...