TCG Blog

TCG Heads to SNIA’s Data Storage Security Summit Sept. 24 to Talk SEDs and Implementing Encryption of Stored Data

Date Published: September, 10, 2015

On Sept. 24, the Storage Networking Industry Association, or SNIA, will host the Data Storage Security Summit. This event includes a number of presentations and keynotes on the growing issue of data protection, the role of encryption, key management and e… READ MORE

Tags:

TCG Talks Internet of Things, Trust and Security at Security of Things Forum September 10

Date Published: August, 28, 2015

It seems like very day brings a different story about a hack or attack on the Internet of Things, or IoT. The number of connected devices, whether wearables or industrial control systems, has exploded but security has not kept pace. Many in the industry a… READ MORE

Tags:

Trusted Computing Focus of 2015 Cybersecurity Innovation Forum

Date Published: August, 20, 2015

Sept. 9-11, Washington, D.C., practitioners of security along with vendors, standards experts and researchers will gather at the Cybersecurity Innovation Forum. Hosted by the National Institute of Standards and Technology, with participation from the Nati… READ MORE

Tags:

Trust and the IoT at the IoT Evolution Developers Conference, Aug. 19-20

Date Published: August, 17, 2015

Since this month’s BlackHat conference in Vegas, the media and blogs have lit up with headlines about hacked Jeeps, Teslas with vulnerable software and potential nuclear meltdowns as a result of poorly secured industrial network. That’s just the tip o… READ MORE

Tags:

Trusted Computing Group Storage Work Group and NVMe Work Group Publish Joint Paper on Role of SEDs

Date Published: August, 11, 2015

Trusted Computing Group (TCG) has long worked with other industry groupsand the TCG Storage Work Group is no exception. Since it started developing the widely adopted specifications for self-encrypting drives (SEDs), TCG has been aligned with a number of … READ MORE

Tags:

Trusted Network Communications Releases SWID Message and Attributes for IF-M for Publication

Date Published: August, 03, 2015

The Trusted Computing Group (TCG) has released the “SWID Message and Attributes for IF-M” specification as a final specification. This specification enables communication about the software state of an endpoint as part of a Trusted Network Communicati… READ MORE

Tags:

Encryption Matters at Flash Memory Summit 2015

Date Published: July, 30, 2015

The Flash Memory Summit has grown rapidly as applications and deployment of flash storage devices has grown, from client devices to enterprise storage systems. Once again, Trusted Computing Group and its members will play a big role in helping educate ven… READ MORE

Tags:

Wired.com Takes on the Unsecured Car and TCG’s Take on Auto Security

Date Published: July, 27, 2015

Wired.com recently published a frightening account of how a typical automobile can be hacked and controlled (more here at http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/). In the test, a reporter in a late model Jeep experienced a series … READ MORE

Tags:

Trusted Computing, TPM Can Prevent Ocean’s Eleven-Style Security Attacks, As Shown in Demo at This Week’s Embedded Systems Conference Silicon Valley by TCG in Action

Date Published: July, 23, 2015

While crashed trains or planes, power plant meltdowns or chemical spills can - and have - occurred as a result of poor security in the Internet of Things, financial gains represent a huge target for attackers and thieves - whether individuals, organized c… READ MORE

Tags:

Securing the IoT Big Focus of This Year’s Embedded Systems Conference Silicon Valley

Date Published: July, 21, 2015

Here in Santa Clara at Embedded Systems Conference Silicon Valley (#ESCSV), the halls are filled with embedded systems designers trying to learn the latest in design, development, tools and technologies. For us here at Trusted Computing Group, it is grati… READ MORE

Tags: