Date Published: January, 22, 2015
For some years, Trusted Computing Group (TCG) has been working with GlobalPlatform to help develop mobile security standards and solutions. Recently, Trustonic’s Jon Geater, who works with both organizations, spoke on the relationship between TPM and Tr… READ MOREDate Published: January, 21, 2015
We all know that security is getting worse, not better. And the growing Internet of Things is not making security any easier to manage. Some in the U.S. have called for a concerted government-backed effort to improve security. A great editorial from Wa… READ MOREDate Published: January, 13, 2015
With the holidays in the rear view mirror, those of us in the security community are looking ahead to RSA Conference 2015 April 20-24. TCG will once again give attendees a great reason to wake up early Monday and head to Moscone West before the floor ope… READ MOREDate Published: January, 01, 2015
Earlier this year, TCG published for public review a new spec that helps protect potentially high-value data in MAP servers, based on TCG’s IF-MAP protocol - click here for details. Based on the feedback received from the public review and prototype imp… READ MOREDate Published: January, 01, 2015
Now that self-encrypting drives are becoming increasingly available and in some cases are the ONLY drive option for enterprise PCs, servers, and storage systems, where can IT and security professionals start and get immediate value with these powerful too… READ MOREDate Published: January, 01, 2015
A recent article in Federal Technology Insider provided some interesting outtakes on the use of Trusted Computing by US federal agencies and related bodies. The article notes the recent publication of NIST documents 800-147, 800-155 and 800-164, all of … READ MOREDate Published: January, 01, 2015
In September, TCG hosted a half-day at the TSCP Cyber Collaboration Workshop (more info and presentations at TCG 2016 Events). Among the topics covered: trust in the cloud, and how standards enable the trusted cloud. Michael Donovan, TCG’s co-chair for… READ MOREDate Published: January, 01, 2015
While we've most certainly dented an old-growth forest trying to explain the many details of the TPM and Trusted Computing in general, a picture (or a good slide) can be worth a thousand words. The highly competent Open Security Training group, following… READ MOREDate Published: January, 01, 2015
Muddled and confused about how to start using the TPM? At TCG's recent RSA session, member MITRE explained the process for strong enterprise security requirements. From MITRE's demo: Before TPMs can be used in an enterprise for machine identification, re… READ MOREDate Published: January, 01, 2015
The increasing use of mobile devices or the integration of remote embedded systems introduces new threats to enterprise IT networks. While most security programs such as desktop firewalls, antivirus and hard drive encryption work pretty well for laptops, … READ MORE