In the 17 December 2009 issue of the Wall Street Journal, the front page article discusses how Shiite insurgents in Iraq have used commercial-off-the-shelf software to intercept and utilize sensitive reconnaissance videos to coordinate their movements and assess the threat of US forces in their strongholds.
This article asks the primary question we should all ask of those executing war strategy and tactics in Iraq: “How were such critical information assets fielded without encryption?” However, there are larger and even more far-reaching questions about the incident that were not asked in this article. This response intends to ask those questions and share them with our systems integrator and Government customers, as these are some of the same questions CPU Tech asked ourselves in developing our secure and anti-tamper processor devices for sensitive data operations. Continue reading
CPU Tech authorized a press release today announcing the release of the Acalis Sentry™ Security Server. The full text of the press release is availabe on the CPU Tech web site, or in an early release and publication at Dark Reading.
At the most basic level, the security server can be thought of as a software plug-in for the Acalis Software Development Kit. This plug-in allows the Security Engineer (a role that can be differentiated from Software Developer) to do a variety of things: a) perform final encryption of the binary boot file for the Acalis Secure Processor, and b) set the various firewall and hardware security settings of the secure processor as well. This software plug-in happens to be hosted on a secure hardware box, utilizing the Acalis CPU872 Secure Processor to protect both CPU Tech’s and the user’s critical programming files, including the encryption algorithm and processes. This raises the security level of the software to the level of the hardware. Continue reading