Thursday Apr 27

Posts Tagged ‘TCG’

Sep
16/11
Trusted Infrastructure at NSA’s Trusted Computing Conference
Last Updated on Tuesday, 31 January 2012 12:31
Written by jj
Friday, September 16th, 2011
Share

Next week, I’ll be presenting on trusted infrastructure at the 2nd Annual NSA Trusted Computing Conference  in Orlando. This year’s focus is Using COTS technologies to deliver decisive defensive advantage. (more…)

Mar
11/10
Making NAC Standard Progress: IETF accepts two TNC specs
Last Updated on Saturday, 28 January 2012 06:36
Written by jj
Thursday, March 11th, 2010
Share

I’m excited to share with you this press released, jointly announced by TNC and IETF. Internet Engineering Task Force Publishes Network Access Control Standards Based on Trusted Computing Group Specifications. Keep reading to find out exactly what this means. (more…)

Jan
14/10
More not-to-be-missed RSA 2010 Sessions
Last Updated on Saturday, 28 January 2012 07:03
Written by jj
Thursday, January 14th, 2010
Share

In addition to the oh-so-exciting session I’m hosting, several friends and colleagues are hosting other sessions at RSA 2010 you don’t want to miss. 

What other sessions are on your ‘don’t miss’ list?  (more…)

Sep
18/09
Catching the Unicorn: A technical exploration of why NAC is failing
Last Updated on Saturday, 28 January 2012 06:42
Written by jj
Friday, September 18th, 2009
Share

Catching the Unicorn:
A technical exploration of why NAC is failing (more…)

May
20/09
Interop: “NAC- Is it Ready for Prime Time?”
Last Updated on Saturday, 28 January 2012 06:45
Written by jj
Wednesday, May 20th, 2009
Share

If you’re here in sunny Las Vegas with us this week for Interop, stop on by the NAC panel this afternoon, 2:00pm Pacific Wednesday, May 20th. As the only non-vendor participant on the panel, it is my duty to keep the vendors in line, harass them and challenge their thoughts on the technologies and standards. I feel I can at least deliver on one of my assigned duties; I can certainly harass them all. ;) It should be fun… (more…)

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- IANS
- SearchSecurity
- TechTarget

Get Social

RSSFacebookLinkedinYoutube

Subscribe

Enter your email address:

Delivered by FeedBurner

NetworkedBlogs