To get a clear view of your security goals and requirements it is very useful to categorize your project into one of four target environments.
Lee Wilson

Recent Posts
Topics: Internet of Things, Privacy, Cyber Security
Every day, thousands of new devices are given internet connectivity - called the Internet of Things (IoT). Figure 1 displays IoT devices attacked worldwide in 2015. Most of the internet connected devices are inherently insecure and hackers realize this as an easy opportunity. Even though home routers were the most targeted devices, others weren’t spared.
Topics: Internet of Things
Whitepaper: Setting and Achieving Security Design Goals
This whitepaper provides a framework on system security design and the security software needed to achieve a system’s security goal. Four software models are examined and critiqued, with recommended strategies for choosing vendors within those differing models.
Topics: Internet of Things, Cyber Security
Topics: TPM, TSS, Cyber Security, Embedded Security, Internet of Things, Cryptography
There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by the Trusted Computing Group. This blog will give a brief overview of those use cases, which can be combined to create more complex and powerful solutions.
Topics: TPM, Internet of Things, Embedded Security, Cyber Security, TSS, Trusted Computing
TPM - a Powerful, Inexpensive Security Building Block
There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.
Topics: TPM, Trusted Computing, TSS, Cyber Security, Embedded Security, Internet of Things, Cryptography