Date Published: October, 29, 2018
TCG members have been working for some time to extend the benefits of the Trusted Platform Module, or TPM, for numerous applications beyond the PC. One of these has been automobiles, which have become rolling computers with complex security requirements t… READ MOREDate Published: October, 22, 2018
Earlier this year, TCG launched a new site that aggregates a number of available tools and information to help designers and developers implement trusted computing, whether in embedded and IOT systems or enterprise ones. That site can be found at http… READ MOREDate Published: October, 04, 2018
A recent Deloitte Touche Tohmatsu Limited survey* found that 85 percent of surveyed global supply chains had experienced at least one disruption in the past 12 months. These disruptions can disrupt business, result in production delays, incur significan… READ MOREDate Published: October, 01, 2018
TCG continues to expand and evolve its core concepts of the root of trust and the protection of data, devices and networks into the IoT and embedded systems. In recent years, a number of TCG members have developed innovative solutions to many security cha… READ MOREDate Published: September, 19, 2018
The Alliance for Telecommunications Industry Solutions (ATIS) (http://ATIS.org) and TCG (https://trustedcomputinggroup.org) have entered into a Memorandum of Understanding (MoU) to advance information and communications technology (ICT) cybersecurity. … READ MOREDate Published: September, 05, 2018
TCG and members Microsoft, Microchip, Winbond and others have helped create DICE , or the Device Identity Composition Engine, that enables a lightweight root of trust for IOT and embedded devices. These companies and others are implementing DICE in a numb… READ MOREDate Published: August, 29, 2018
Attestation, the ability to monitor the authenticity of software versions and configurations running a device, allows owners and auditors to detect deviation from approved software and firmware and potentially identifying misconfigured or infected devices… READ MOREDate Published: August, 06, 2018
TCG member OnBoard Security, which offers a Trusted Software Stack (TSS) for the TPM 2.0, has just published a useful paper on how to evaluate software security and how to develop and maintain more secure software. The paper also includes some case studie… READ MOREDate Published: July, 30, 2018
The Trusted Computing Group has released a new whitepaper describing how the combination of technologies developed in its mobile and Trusted Network Communications (TNC) workgroups can be combined to address challenges faced by mobile device, mobile netwo… READ MOREDate Published: July, 26, 2018
The growing number of embedded and Internet of Things devices means more attack surfaces and opportunities for mayhem. Many devices were developed with little or no security considerations, and traditional security approaches, including the TCG’s Truste… READ MORE