1 post in this topic

Secure is the New Black: The Evolution of Secure Mobile Technology for Government Agencies
Full article: http://www.federaltechnologyinsider.com/secure-new-black-evolution-secure-mobile-technology-government-agencies/

This article is somewhat old . . . but it was recently shared by the Trusted Computing Group on July 28, 2014. It is currently on the front page.

The CSD 3324 telephone and fax system has provided the Department of Defense (DoD) with secure voice and fax communications for years. Using the AES 256-bit encryption algorithm and the Diffie-Hellman key exchange, this old work horse ensures that all messages get through safely. So if outdated voice and fax technology can be secure, then why can?t mobile devices?

For years in the DoD, desktops have been protected by technology known as trusted computing. At first highly mobile laptops like the Samsung Chrome Book or the Sony Ultra Book had the Trusted Platform Module (TPM) chip embedded on the motherboard.  But now virtually every laptop has a TPM chip that is enabled in the operating system.

. . .

In its simplest form, a TPM mobile chip provides a secure storage location for certificates and encryption keys that is separate from other memory. Experts warn that TPM is not a panacea and must be used in conjunction with other security measures such as malware and anti-virus protection, whole disk encryption, and strong passwords or two-factor authentication.

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.