Skip to Content

Media Coverage

Why Self-Encrypting Drives Are the Future of Storage

By Michael J. Miller

January 24, 2012

Featured Debate:  Are we winning the cyber security war?

Steven Sprague, CEO of Wave Systems says the situation is bad and getting worse as attacks get more frequent and more sophisticated. Moderated by John Dix, Network World Editor-in-Chief.

January 23, 2012

Security lessons Zappos’ 24 million customer breach should teach us

By Steven Sprague

January 17, 2012

IT Security & Network Security News & Reviews: Dell, Cisco, IBM Among Top Buyers of Security Companies in 2011

By Fahmida Y. Rashid

December 30, 2011

Durable Defence Against Data Loss

By Joseph Souren

Winter 2011/2012

Future Banking Magazine

Why Organisations Should Embrace The Trusted Computing Standard

By Joseph Souren

December 15, 2011

3 Top Under-the-Radar Security Stocks

By James Rogers

December 15, 2011

Layer Up for Best Protection

The stormier cyber-threat landscape requires yet another layer of IT security

By Joseph Souren

December 9, 2011

Ingram Micro To Sell Wave Security

By Antone Gonsalves, CRN

November 3, 2011

Wave Systems Signs Global Agreement with Ingram Micro

By Mark Cox

November 2, 2011

Coverage from the Trusted Computing Seminar, London, October 20th

A collection of articles from several online security publications detailing discussions and developments at the Wave-sponsored Trusted Computing Seminar in London

October 21, 2011

OMB Requirements for Accepting Externally-Issued Identity Credentials

FROM: Steven VanRoekel, Federal Chief Information Officer

October 6, 2011

Executive Office of the President � Office of Management and Budget � Washington, DC

9/11, A Decade Later � A better paradigm emerges for cyber security

By Steven Sprague

September 28, 2011

Wave Systems Acquires Data Loss Protection Vendor Safend

A collection of articles from several online security and investor publications regarding the Wave Systems Corp. acquisition of Safend

September 23, 2011

Wave Systems Uses Security Chip to Detect and Mitigate Malware and APTs

Endpoint Monitor Provides the Foundation for Granting Access to Networks and Cloud Services From Only Known Devices, Verified to be Free of Malware

September 20, 2011

LynuxWorks and Wave Demonstrate First Use of Multi-Banded Self-Encrypting Drive Combined With Secure Virtualization

Secure Endpoint Has Encrypted Disk Bands Linked to Different LynxSecure Domains for Strong Data Security on a Single Platform

September 20, 2011

Transglobal Secure Collaboration Program Members to Speak at 2nd Annual NSA Trusted Computing Conference & Exhibition

Panel Discussion with The Boeing Company, Northrop Grumman, Raytheon, and Wave Systems Executives to Discuss “Securing the Supply Chain with Trusted Computing”

September 12, 2011

Preventing Network Breaches � Trusted Platform Modules are the Key

September 2011

By Steven Sprague

The Pros and Cons of Opal Compliant Drives

August 25, 2011

Defense Contractor Hacks Underscore Vulnerability to Phishing Attacks

August 23, 2011

Seeking Tomorrow’s Security Solutions Today, Part 1

July 21, 2011

Seeking Tomorrow’s Security Solutions Today, Part 2

July 28, 2011

By Richard Adhikari

Strategic News Service Publishes Special Guest Letter by CEO Steven Sprague

Published July 7, 2011, by Strategic News Service (SNS). Copyright � 2011 Strategic News Service and Steven Sprague. Redistribution prohibited without written permission. To learn more about SNS membership or to subscribe to the SNS newsletter, visit

July 7, 2011

Wave CEO Steven Sprague Makes the Case for Device ID in Infosecurity-US Op-Ed

June 22, 2011

USA Today Quotes CEO Sprague in Discussion of Citigroup Breach

June 10, 2011

David Lacey blog: Comments on SED Adoption

June 7, 2011

David Lacey blog: Lessons from the Attack on Lockheed Martin

June 3, 2011

TechNewsWorld Coverage of White House Strategy for Cyberspace

By Richard Adhikari

June 2, 2011 Analyst Richard Stiennon Discusses Use of the TPM with Wave CEO

May 19, 2011

New Ponemon Study Finds That Self-Encrypting Drives (SEDs) Most Effective Against Data Breaches

Press Release: BusinessWire

May 4, 2011

Lee company works to reduce risk of identity theft

By Brandon Walker

April 22, 2011

White House unveils strategy for online ID credentials

By Kent Hoover, ACBJ Washington Bureau Chief

April 21, 2011

Online Identity Theft Prompts Security Guidelines from White House

By Michael Ono

April 21, 2011

White House finalizes online identity strategy

By Angela Moscaritolo

April 15, 2011

Obama Administration Unveils Internet ID Plan

April 15, 2011

Rising global security threats shine light on shortcomings of proprietary software-based security

By Brian Berger

April 15, 2011

Is your stored data protected?

By Michael Willett

April 6, 2011

Simplify HITECH Data Protection with Self-Encrypting Drives

Posted by Lora Bentley

April 1, 2011

Shifting to Hardware-Based Encryption

Why Saint Barnabas Healthcare System Made the Switch
By Howard Anderson, Executive Editor

March 8, 2011

Join the Club: Changing the Status Quo for Security

By Brian Berger

March 2, 2011

Healthcare Provider Uses Wave & SED to Prevent Data Loss

By Ellen Messmer, Network World

March 2, 2011

Podcast: Shifting to Hardware-Based Encryption � Why Saint Barnabas Healthcare System Made the Switch

February 14, 2011

U.K. Government�s National Technical Authority for Information Assurance (CESG), Issues TPM Tips

February 7, 2011

RSA Conference 2011 Podcast featuring Lucy Thompson, editor and co-author of ABA’s Data Breach and Encryption Handbook

February, 2011

Changing the Status Quo for Security

January 26, 2011

Moving forward in IT with strong, mobile data protection

January 17, 2011

Wave CEO Steven Sprague Appears on CNBC’s “Squawk on the Street”

January 13, 2011

Self-Encrypted Drives Set to Become Standard Fare

By Melissa J. Perenson, PCWorld

January 5, 2011

Game Changers Pushing EHRs Forward

By Greg Gillespie (also available in print-friendly version)

December 29, 2010

Wave Embassy Trusted Drive Manager Simplifies Encrypted Drive Management

By Mike Fratto

November 23, 2010

Trusted Computing Group to Participate in NASSCOM-DSCI Annual Information Security Summit 2010

November 22, 2010

Protecting Patient Data to Protect Your Hospital: A Guide

By Rachel Fields

November 9, 2010

New Solution Helps Businesses Deploy and Manage BitLocker Encryption

BitLocker Manager Helps Businesses Deploy and Manage BitLocker Encryption Globally

November 4, 2010

Strong user authentication in self-encrypting drives

By Lark Allen

October 28, 2010

HDM Recognizes EHR Game Changers

Wave Congratulates Boston Medical�s Mark Mulvaney, One of Six to Win an EHR Game Changer Award from Health Data Management

October 19, 2010

PwC lauds Trusted Platform Module for strong authentication

By Ellen Messmer

September 15, 2010

Seagate Laptop Drives Geared for Top Secret Data

By Gene Hirschel

September 15, 2010

TIME TO ACT: Inadequate Security Imperils Infrastructure

By Pat Toensmeier

September issue of Aviation Week’s magazine Defense Technology International
Pages 39 and 40

September 2010

Intel-McAfee Marriage Could Fuel Renewed Chip Security Interest

By Robert Westervelt

August 26, 2010

Hardware Security Hits the Road

By David Lacey

August 25, 2010

Research to Watch: Hope in Hardware

By Simson Garfinkel

July/August 2010

BNY Mellon Launches eVault Service for Digital Mortgage Docs

By Austin Kilgore

June 30, 2010

Hardware-Based Solutions Increase Encryption Security

By Robert Thibadeau

Computer Technology Review (

June 16, 2010

The TPM, Trust and the Cloud: Making Trust Real

By Brian Berger

May 27, 2010

Wave Cuts Loss, Aided By PC Sales, Security Regs

By Donna Howell

May 10, 2010

Managing a Network of Self-Encrypting Hard Drives

By Aidan Herbert

May 1, 2010

The Rise of Self-Encrypting Hard Disk Drives

By Mathew Schwartz

March 16, 2010

Encryption: Why Stop With Laptops?

By Ed Moyle

March 16, 2010

Wave Systems Rides The Wave Of Self-Encrypting Disk Drives

By David Hill

February 9, 2010

Mobile Security: A Surefire Laptop Encryption Strategy

By Laura Taylor

February 8, 2010

Five Great Reasons to Adopt Trusted Computing

By Ken Yasumoto-Nicolson

November 11, 2009

Full Disk Encryption Evolves

By Greg Shipley

September 26, 2009

Single sign-on to services and applications in the cloud

September 18, 2009

Open Identity Pilot for Federal Government

Various Online Publications

September 9-10, 2009

Total Notebook Security

The Benefits Of Full Disk Encryption

By William Van Winkle

Cover Stories
August 2009 � Vol.7 Issue 8 � Page(s) 42-43 in print issue

Built-in encryption is the future of storage

By Jessica Twentyman

May 7, 2009

Crypto providers try to take the pain out of encryption

By�William Jackson

April 22, 2009

Samsung adds full disk encryption to solid state drives

By�Jose Vilches

April 16, 2009

Dell Laptops to Feature Samsung Encrypted SSDs

By�Paul Lilly

April 16, 2009

You won�t care if you lose these Samsung encrypted flash drives

By�Dean Takahashi

April 16, 2009

Samsung comes clean with self-encrypting SSDs

By�Darren Murph

April 16, 2009

Full disk encryption comes to SSDs for mobile devices, laptops

Dell adds encrypted drives to its Latitude line of laptops

By�Lucas Mearian

April 16, 2009

Dell Latitude Delivers Iron Clad Data Security Solutions for Mobile Professionals

April 16, 2009

Samsung adds full disk encryption to solid state drives

By Andrew Nusca

April 16, 2008

Toshiba to Demo New Self-Encrypting HDD at RSA Conference

New encryption software, which uses Wave Systems’ Trusted Drive Manager application, is built around NIST-certified AES encryption technology fully integrated within the HDD’s controller.

By Chris Preimesberger

April 15, 2009

Dell launches freshened Vostro 1320, 1520 and 1720 laptops

By Darren Murph

April 2, 2009

Government should lead transition to self-encrypting drives

By Jon Oltsik

March 9, 2009

Cover Story: Catching the ‘E" Adoption Wave

Mortgage Technology Magazine

March 11, 2009

Wave eSignSytems’ VPs Nancy Alley and Kelly Purcell grace the
cover of Mortgage Technology Magazine’s March 2009 issue.

For full magazine, please visit:

>> more eSignSystems Media Coverage

Self-encrypting drives based on Trusted Computing Group specifications

March 9, 2009

TCG sets the drive encryption standard

March 6, 2009

Opal Storage Spec Advances Hardware Encryption

January 27 – February 2, 2009

Opal promising interoperable disk-drive security

January 23, 2009

Your laptop data is not safe. So fix it.

January 19, 2009

Mortgage Technology > Magazine

An ESIGN Reunion

By Nancy Alley

November 20, 2008

Papa Gino’s Pizzeria Adds Encryption to Menu

The restaurant chain is prepared for data breach laws, which are increasing in number and complexity.

By George Hulme

November 13, 2008

Data Security Podcast Episode 22
Host Ira Victor talks with Steven Sprague about a simple and more secure approach to two-factor authentication using the TPM chip. This technology can be used to secure cloud computing data and for better security on wireless networks using WPA and TPM.

Interview appears at 12:01 in the podcast

Audio Stream:

On iTunes:

October 14, 2008

Palin Email “Hack” Underscores Need for Stronger Authentication

By Steven K. Sprague, President and CEO, Wave Systems Corp.

September 23, 2008

Palin E-mail Hack Could Easily Have Been Avoided,
Experts Say

By Stefanie Hoffman

September 19, 2008

Could Palin Hack Have Been Prevented?

By Byron Acohido

September 19, 2008

Card Use Can Stem ID Theft, Microsoft Says

By Jabulani Leffall

September 18, 2008

Call Off the Dogs � Authentication Solution Already in Enterprise-class PCs

By Steven K. Sprague, CEO, Wave Systems Corp.
Special to ZDNet

September 15, 2008

Companies Finding a Place for Maturing NAC Projects

By David Strom

September 2008
(Registration Required)