Boulevard Press

Automobiles using Hardware Root of Trust to Securely Provide Software updates Over The Air

My car performed an over the air (OTA) update of the infotainment system last week. It was really cool! It was performed when I got home and parked the car. I didn’t have to waste time, sitting in traffic, going to the car dealer. There was nothing to plug in or wirelessly connect to. It … Continue reading "Automobiles using Hardware Root of Trust to Securely Provide Software updates..

Read More

Trusted Computing Group Releases Network Equipment Security Guidance

TCG Members Infineon Technologies and Juniper Networks Demonstrate How to Secure Network Equipment with TPM at Mobile World Congress PORTLAND, Ore., Feb.13, 2018 – Trusted Computing Group (TCG) today announced new guidance and an architects guide to secure network equipment. In a few weeks at Mobile World Congress, TCG members Infineon Technologies and Juniper Networks … Continue..

Read More

IPC, A SUBWAY® Franchisee Owned Organization Relies on Thycotic Privileged Access Management Solutions to Help Protect Enterprise Class Network

WASHINGTON, Feb. 13, 2018 /PRNewswire/ — Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, announced that Independent Purchasing Cooperative (IPC), the supply chain management company for Subway restaurants, is expanding its Thycotic Secret Server to consolidate, manage and protect privileged account access across its global..

Read More

Thycotic’s Vice President of Channel Sales, Americas, Recognized as 2018 CRN® Channel Chief

Washington, D.C. – February 12, 2018 – Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, announced today that CRN®, a brand of The Channel Company, has named its Vice President of Channel Sales, Bob Gagnon, to its prestigious list of 2018 Channel Chiefs. The executives on this..

Read More

Parity Technologies engages Trail of Bits

We’re helping Parity Technologies secure their Ethereum client. We’ll begin by auditing their codebase, and look forward to publishing results and the knowledge we gained in the future. Parity Technologies combines cryptography, cellular systems, peer-to-peer technology and decentralized consensus to solve the problems that have gone unaddressed by conventional server-client..

Read More

Thycotic Wins Gold in 2018 Cybersecurity Excellence Award

Washington, D.C. – February 8, 2018 – Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, announced today that its Secret Server 10.4 solution was recognized as a Gold Winner by the 2018 Cybersecurity Excellence Awards for the Privileged Access Management category. This is the third year in a..

Read More

Untangle Expands Market Reach With The Addition of Five Strategic Value Added Distributors

NG Firewall and Command Center Provide Partners a Powerful Network Security Solution to Address the Needs of Managed Service Providers SAN JOSE, Calif.– February 7, 2018 – Untangle®, Inc., a leader in comprehensive network security for small-to-medium business (SMB), today announced the addition of five new Value Added Distributors (VADs) across Europe and Latin America,..

Read More

Untangle Expands Market Reach With The Addition of Five Strategic Value Added Distributors

NG Firewall and Command Center Provide Partners a Powerful Network Security Solution to Address the Needs of Managed Service Providers SAN JOSE, Calif.– February 7, 2018 – Untangle®, Inc., a leader in comprehensive network security for small-to-medium business (SMB), today announced the addition of five new Value Added Distributors (VADs) across Europe and Latin America,..

Read More

TCG Webcast February 15 to Show TPM and New Trusted Software Stack for Integrity, Authentication, Health Monitoring and More.

PORTLAND, Ore., Jan. 30, 2018 – How to use the Trusted Platform Module? Trusted Computing Group (@TrustedComputin) will address that question and more in a webcast, How to Implement Trusted Platforms and EcoSystems, Thursday, Feb. 15, 1:00 p.m. Eastern/10 a.m. Pacific. Trusted Computing provides foundational security for enterprise, embedded and IoT devices to prevent breaches, …..

Read More