Most nsa trusted computing conference 2011 related news are at:
trustedcomputinggroup.org
– Trusted Computing Group - Home
TPM Security Overview: Defining the Benefits of TPM Devices 26 Aug 2013 | 05:00 am
By Michael Cobb, Application Security Information security is awash with a variety of attacks aimed at everything from Web browsers to authentication processes to Adobe software. Defending such a lar...
The Pressing Need to Improve Endpoint Visibility for Information Security 26 Aug 2013 | 05:00 am
Author: Jon Oltsik In a recent ESG research project, 315 security professionals working at enterprise organizations (i.e., more than 1,000 employees) were asked to identify their organizations’ endpo...