Hardware

Logic Boards in a Pile

IT Asset Disposition (ITAD) is the Slow Motion Data Breach Nobody notices

Efforts to wall off sensitive corporate and government data from foreign adversaries have a gaping hole: IT asset disposition (ITAD), where vendors – many owned by Chinese firms – process discarded hardware and data with little oversight.

DEF CON vote machine hacking

Episode 172: Securing the Election Supply Chain

In this episode of the podcast (#172), Jennifer Bisceglie, the founder and CEO of Interos to talk about the links between America’s voting infrastructure and countries with a history of trying to subvert democracy.

Hacker Image

Spotlight Podcast: Building Resilience into the IoT with Rob Spiger

In this Spotlight edition of the Security Ledger Podcast, sponsored by Trusted Computing Group*: we’re joined by Rob Spiger, a principal security strategist at Microsoft and co-chair of the cyber resilient technologies working group at Trusted Computing Group. Rob talks to us about efforts to make more resilient connected devices and how the advent of the Internet of Things is changing TCG’s approach to building cyber resilient systems.

Electronic voting machines.

Study finds Chinese Hardware Powers U.S. Voting Machine

A new study by the firm Interos found that many hardware components in a popular touchscreen voting machine used in the U.S. originate in China or Russia.

Trusted Platform Module 1

Spotlight Podcast: Two Decades On, Trusted Computing Group tackles IoT Insecurity

In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Steve Hanna joins us to talk about TCG’s 20th anniversary and how the group is tooling up to confront the challenge of securing billions of Internet of Things devices.