Date Published: January, 01, 2015
At last month's RSA Conference, mobile security was, to nobody's surprise, a big topic. During the TCG session, long-time TCG member Nokia showed its Nokia Lumia 920 mobile device which incorporates Trusted Computing technology (Windows Phone 8 secure boo… READ MOREDate Published: January, 01, 2015
Much has been made about what exactly can be accomplished with the Trusted Platform Module, or TPM. Now that Windows 8 is available, that question becomes easy: lots can be done with the TPM to ensure better system, data and network security. One key use… READ MOREDate Published: January, 01, 2015
While billions of TPMs have been embedded into all kinds of computing devices - from PCs to gaming machines - provisioning the TPM for real-world use historically posed some challenges. TCG has been working in recent years to change this. Last year, we r… READ MOREDate Published: January, 01, 2015
Ponemon Institute has just released a the "2013 Annual Cost of Failed Trust Report: Threats and Attacks." It showed that the cost of failed key and certificate management threatens the security of enterprises around the world - while costing $400 millio… READ MOREDate Published: January, 01, 2015
TCG members WinMagic with LSI Corporation, Micron, PLEXTOR, Seagate, Samsung and Toshiba recently commissioned a study to determine what, if any, cost savings resulted from using self-encrypting drives, or SEDs, for data protection instead of software en… READ MOREDate Published: January, 01, 2015
Self-encrypting drives, or SEDs, quickly are becoming increasingly available as a standard drive for many enterprise systems. As more IT departments replace aging systems with ones that have SEDs, more questions about how to deploy these drives will co… READ MOREDate Published: January, 01, 2015
In recent months, disturbing news has emerged about widespread surveillance by government agencies. The privacy and confidentiality of citizens around the world has apparently been violated on a daily basis as information about their emails and phone call… READ MOREDate Published: January, 01, 2015
Trusted Computing Group TPM Adds Security to Platforms Using Windows 8 and Windows Server 2012 Date Published: December 6, 2012 PORTLAND, Ore., Dec. 6, 2012 – PCs and mobile devices using the new Windows 8operating system and Windows Server 2012 will be… READ MOREDate Published: January, 01, 2015
IF-MAP, the interface for a Metadata Access Point, is a standard client/server protocol for accessing a Metadata Access Point (MAP). The MAP acts as a central clearinghouse for information about network security objects and events, such as users, devices,… READ MOREDate Published: January, 01, 2015
Much has been made recently of unsecured certificates and passwords. TheHeartbleed OpenSSL vulnerability, which left keys in the open and vulnerable to hackers, alone has created countless hours of work and coverage. And lost or stolen passwords and keys … READ MORE