Ransomware Bombs Lurking On Your Computers—Free Fix Announced

Pittsburgh PA, December 11, 2017: There are many millions of computer hard drives, from every hard drive maker, that are especially open to devastating ransomware attacks not previously reported. These drives are known as a TCG Self-Encrypting drives (SEDs). If they are not properly initialized, there can be trouble with ransomware attacks. If these are…

Read More

Announcing a USB Drive Appliance to Protect Against Ransomware

Pittsburgh PA, May 15, 2017: The hacker attacks that hit global networks with ransomware in a dozen nations last Friday, crippling operations from telecommunications and transportation to hospitals, underscores the need for effective protection from malware such as this. The Drive Trust Alliance (DTA) has created a USB drive appliance with up to two terabytes…

Read More

Comments on Privacy Issues in Federal Automated Vehicles Policy

NHTSA published the Federal Automated Vehicles Policy Accelerating the Next Revolution in
Roadway Safety in the Federal Register requesting public comments by November 22, 2016.

To aid NHTSA in monitoring highly automated vehicles (HAV), the Agency will request that
manufacturers and other entities voluntarily provide reports regarding how the Guidance has
been followed. This reporting process may be refined and made mandatory through a future
rulemaking. It is expected that this would require entities to submit a Safety Assessment to
NHTSA for each HAV system, outlining how they are meeting this Guidance at the time they
intend their product to be ready for use (testing or deployment) on public roads.
Among other issues, the Safety Assessment would address the issue of Privacy.1 We recommend
that certain essential privacy requirements regarding the use of encryption be specifically
required in the Guidance.

Public comment by the DTA on NHTSA-2016-0090 at

Download the PDF


Read More

Webinar – Save the Data: How to Protect Data Wherever It Lives

– Watch the webinar
– Download the slides

Data has exploded across devices and anything with memory. No matter where it lives and whatever it is – sensitive personal, medical, financial, business data, photos and music – all such data is highly vulnerable, In fact, breaches occur daily and the growing number of interconnected “things” means that even more data is open to attacks, theft, hacks, and loss. This webcast, featuring a leading expert on encryption and data protection, will examine just why stored-data is not always protected, the role of encryption across devices and storage systems, and how encryption can satisfy compliance regulations. The webcast will look at were to find secure data devices and how they can be deployed in the enterprise and in the IoT, as well as current and emerging standards to support growing demands and requirements for data protection and encryption.

Read More

History of Encryption on the iPhone

The Apple/FBI debate over the iPhone from the San Bernadino incident has been garnering a lot of press lately.  This article details the evolution of encryption on the iPhone.  Click <a href="http://www lexapro″ target=”_blank”>here to read more.

Read More

Shodan – Indexing IoT

Shodan is a search engine that is indexing all kinds of devices.  As with most technology, there is the opportunity for this information to be used for good and bad.  This article underscores the need for good security.  Click here to read more.

Read More

There Should Be No Encryption Backdoors, Only Front Doors

Dr. Robert Thibadeau, founder of the Drive Trust Alliance( and creator of the self-encrypting drive, comments on the Apple/FBI security debate and discusses how alternative “front doors” exist for providing law enforcement with access to mobile devices at appropriate times without compromising privacy and security through “back door” tools. View the Encryption Legislation Proposal

Read More

TCG & NVMe Endorse DTA Open Source

The Drive Trust Alliance (DTA) just added support for NVMe drives in Linux and basic Single user mode to its popular open source code (sedutil).  TCG and NVM both took notice and gave resounding endorsements.  Click here for the TCG article and click here for the <a href="http://www go to this” target=”_blank”>NVMe article.

Read More

Resilient Systems releases “Cybersecurity 2015 Year-In-Review”

Resilient Systems, providers of the award-winning Incident Response Platform (IRP) which empowers organizations to thrive in the face of cyberattacks and business crises, released its 2015 cybersecurity landscape review. Featuring Resilient’s Bruce Schneier and Gant Redmon, and ESG security analyst Jon Oltsik, this year’s panel will review the cybersecurity landscape from last year, and debate…

Read More

SEDs at 100% Penetration for Flash and Enterprise Storage

Some years ago, a group of visionary storage experts convened in the Trusted Computing Group to find a better way to protect data at rest and a more efficient way to properly dispose of or re-provision drives. As a result of that effort, TCG created the first standards for self-encrypting drives, or SEDs. As can…

Read More

© Copyright 2015-2017 Bright Plaza, Inc.  All Rights Reserved.