TCG Blog

Trusted Execution Environment, TPM Provide Strong Mobile Security Foundation, Say Experts

Date Published: January, 22, 2015

For some years, Trusted Computing Group (TCG) has been working with GlobalPlatform to help develop mobile security standards and solutions. Recently, Trustonic’s Jon Geater, who works with both organizations, spoke on the relationship between TPM and Tr… READ MORE

Tags:

TCG Member Calls on President to Improve Cybersecurity with TPM and More

Date Published: January, 21, 2015

We all know that security is getting worse, not better. And the growing Internet of Things is not making security any easier to manage. Some in the U.S.  have called for a concerted government-backed effort to improve security. A great editorial from Wa… READ MORE

Tags:

Save the Date: RSA Conference 2015 to Host TCG Session with Look at IoT and Other Critical Security Issues

Date Published: January, 13, 2015

With the holidays in the rear view mirror, those of us in the security community are looking ahead to RSA Conference 2015 April 20-24. TCG will once again give attendees a great reason to wake up early Monday and head to Moscone West before the floor ope… READ MORE

Tags:

TCG Publishes MAP Content Authorization Specification, Leveraging XACML to Protect Data

Date Published: January, 01, 2015

Earlier this year, TCG published for public review a new spec that helps protect potentially high-value data in MAP servers, based on TCG’s IF-MAP protocol - click here for details. Based on the feedback received from the public review and prototype imp… READ MORE

How to Start Deploying Self-encrypting Drives? Simple Crypto-erase for Drive Retirement Is a Good First Step

Date Published: January, 01, 2015

Now that self-encrypting drives are becoming increasingly available and in some cases are the ONLY drive option for enterprise PCs, servers, and storage systems, where can IT and security professionals start and get immediate value with these powerful too… READ MORE

Security is the New Black – A Look at Growing Support for Trusted Company

Date Published: January, 01, 2015

A recent article in Federal Technology Insider provided some interesting outtakes on the use of Trusted Computing by US federal agencies and related bodies.  The article notes the recent publication of NIST documents 800-147, 800-155 and 800-164, all of … READ MORE

Trust in the Cloud

Date Published: January, 01, 2015

In September, TCG hosted a half-day at the TSCP Cyber Collaboration Workshop (more info and presentations at TCG 2016 Events). Among the topics covered: trust in the cloud, and how standards enable the trusted cloud. Michael Donovan, TCG’s co-chair for… READ MORE

Open Security Training Tackles Trusted Computing and TPM

Date Published: January, 01, 2015

While we've most certainly dented an old-growth forest trying to explain the many details of the TPM and Trusted Computing in general, a picture (or a good slide) can be worth a thousand words. The highly competent Open Security Training group, following… READ MORE

From RSA Conference: Demonstrating the Feasibility of High Security TPM Provisioning Processes in the Enterprise

Date Published: January, 01, 2015

Muddled and confused about how to start using the TPM? At TCG's recent RSA session, member MITRE explained the process for strong enterprise security requirements. From MITRE's demo: Before TPMs can be used in an enterprise for machine identification, re… READ MORE

Automated Security for Remote Systems

Date Published: January, 01, 2015

The increasing use of mobile devices or the integration of remote embedded systems introduces new threats to enterprise IT networks. While most security programs such as desktop firewalls, antivirus and hard drive encryption work pretty well for laptops, … READ MORE