Edmonds, WA 98020 [email protected]
+1 (425) 245-8247
The Trusted Computing Group’s (TCG’s) Trusted Platform Module 2.0 (TPM 2.0) specification provides the foundation for building hardware-based cryptographic processing functions into modern-day electronic systems. But where do you go from there?
Intrusion detection and prevention systems (IDPS) can be described as advanced firewalls that help guard against both internal and external network-borne threats. They are usually deployed in the context of an entire network. But what about detecting and preventing an intrusion on an individual device, like a connected embedded or IoT system?
Are your systems secured to FIPS 140-2? Do you want the good news or the bad news first?
The bad news is that FIPS 140-2 has been superseded. The good news is that wolfSSL’s wolfCrypt crypto library has been validated to FIPS 140-3.
What’s the most secure, reliable type of software you can think of? The software running on aircraft is certainly at the top of the list.
One of the biggest advantages of IoT devices is that they can be updated remotely post-deployment. Of course, those update mechanisms have to be secure.
Secure connections are more imperative forever, even for the simplest Internet-enabled devices.
This week’s product, the wolfSSL embedded SSL/TLS library, is a 20 kB to 100 kB cryptographic library with a runtime memory footprint of just 1 kB to 36 kB. That makes it up to 20x smaller than OpenSSL.
wolfSSL announced the expansion of its most comprehensive set of cryptographic benchmarks.