Date Published: July, 25, 2018
On July 24, eWeek published a story about new support for TPM 2.0 from TCG member Mocana, http://www.eweek.com/security/mocana-embraces-tpm-2.0-for-iot-device-authentication-assurance. eWeek security journalist Sean Kerner (@SeanKerner) notes, “...… READ MOREDate Published: July, 12, 2018
TCG and its work groups recently have spent much time examining the growing insecurity of payments via mobile/IoT devices and how core concepts of trusted computing can be applied to reduce fraud and better protect payments, which are quickly becoming a n… READ MOREDate Published: May, 24, 2018
*This blog was originally published by Onboard Security, a TCG member. Many IoT device manufacturers understand the need for cyber security but aren’t sure where to begin. To add to the confusion, some security vendors will claim their firewall or … READ MOREDate Published: May, 17, 2018
*This blog was originally published by Onboard Security, a TCG member. There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by the Trusted Computing Group. Thi… READ MOREDate Published: February, 26, 2018
Auto makers have long struggled with the recall issue. A significant portion of recalls are associated now with software updates to our rolling computers, aka cars. These increasingly complex systems of course require the same patches and updates any comp… READ MOREDate Published: February, 14, 2018
In the last year or so, TCG members active in developing and supporting network equipment, such as switches, routers and firewalls, have been actively working to develop specific guidance and how-to for protecting these devices against attacks. Why wor… READ MOREDate Published: January, 25, 2018
A new post in Embedded Computing Design by Microsoft’s Dennis Mattoon, also the chair of TCG’s DICE Work Group, explains how the Device Identifier Composition Engine, or DICE, is used to provide a hardware-based root of trust for IoT and embedded syst… READ MOREDate Published: January, 05, 2018
On Feb. 15, 10:00 a.m. Pacific/1:00 p.m., TCG will host a webcast on using the new TCG software stack for securing devices and data. Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs… READ MOREDate Published: December, 13, 2017
Technology distributor Avnet has announced a new security peripheral module based on the TPM 2.0. This module is targeted to Industrial IoT applications, such as factory automation, smart grid and healthcare and will provide a hardware root of trust for p… READ MOREDate Published: November, 30, 2017
Steve Hanna, Infineon and co-chair or chair of TCG’s embedded systems, IoT and Industrial Work Groups, will speak at the IoT Evolution Expo (http://www.iotevolutionexpo.com/east/) on Wednesday, January 24, 2018, at 3:00 p.m. – 3:55 p.m. ET in a sessi… READ MORE