TCG Blog

Everything You Wanted to Know About the TPM: TCG Webcast January 31, 2017

Date Published: January, 10, 2017

Visitors to the TCG website, http://www.trustedcomputinggroup.org, still view documents associated with the TPM, or Trusted Module Platform, more frequently than any other topic. In 2016, TCG released its TPM 2.0 Library Specification ( http://www.tru… READ MORE

STMicro Releases New Security Modules with TPM 2.0

Date Published: December, 01, 2016

Long-time TCG member STMicroelectronics has long implemented the TCG TPM specifications. This week, it announced a new product line. From their site (http://www.st.com/content/st_com/en/about/media-center/press-item.html/p3859.html): “…STMicroelect… READ MORE

Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs

Date Published: November, 18, 2016

TCG and its members created a non-proprietary way to ensure data on storage devices, such as hard disk drives or solid state (flash) drives. The industry specifications for self-encrypting drives (http://www.trustedcomputinggroup.org/work-groups/storage/)… READ MORE

Resources for Using the Trusted Platform Module 2.0 Library Specification

Date Published: October, 13, 2016

Trusted Computing Group’s TPM 2.0 Library Specification, recently adopted as an ISO/IEC 11889:2015 standard (http://www.trustedcomputinggroup.org/tpm-2-0-library-specification-approved-isoiec-international-standard/), is a new way to implement TPM and t… READ MORE

How to Trust Your Operational Technology (OT) Networks – A Look at Securing Manufacturing

Date Published: September, 27, 2016

Even as enterprises make progress on securing traditional IT networks, the OT, or operational technology, side of networks remain surprisingly vulnerable. Why? In the IT world, administrators regularly patch, use more current versions of hardware and soft… READ MORE

追悼 山口英先生

Date Published: September, 20, 2016

by Jun Takei, Intel Corporation 日本の情報セキュリティに多大なる貢献をされてきた奈良先端科学技術大学院大学の山口英先生が2016年5月9日に急逝されました。 先生のいままでの功績は多くの… READ MORE

Most Security Human Error – But Trust Plays Key Role

Date Published: September, 15, 2016

In the world of cybersecurity, there certainly seems to be lots of work to do - each day brings new breaches, attacks and vulnerabilities. While much of security involves human error or negligence, foundational security based on the concepts of trust can … READ MORE

Security of Things Forum Sept. 22, Cambridge, Features TCG Intel Speaker and Many Others; Discount Tickets Available

Date Published: September, 13, 2016

For several years, Security Ledger (https://securityledger.com) has been hosting the Security of Things Forum in the Boston area. This year, Christian Science Monitor is co-hosting and the line-up looks great - speakers will offer IoT security perspective… READ MORE

Trusted Computing Group September 20, 2016 Webcast to Address Strong Device Identity & Securing Endpoints

Date Published: September, 08, 2016

As part of its ongoing webcast series, Trusted Computing Group and members will host a session Tuesday, Sept. 20, 9:00 a.m. Pacific/12:00 p.m. to address how to secure the IoT with strong device identity and techniques to securing IoT endpoints and the ro… READ MORE

Trust and Manufacturing: TCG Expert Explains Role of Trust and Security in Sept. 9 Conference

Date Published: September, 01, 2016

Manufacturers worldwide are deeply concerned about protecting their processes, intellectual property, products and brands. While hacking of baby monitors and thermostats might grab headlines, larger problems are looming as manufacturers of all kinds of it… READ MORE