Date Published: January, 10, 2017
Visitors to the TCG website, http://www.trustedcomputinggroup.org, still view documents associated with the TPM, or Trusted Module Platform, more frequently than any other topic. In 2016, TCG released its TPM 2.0 Library Specification ( http://www.tru… READ MOREDate Published: December, 01, 2016
Long-time TCG member STMicroelectronics has long implemented the TCG TPM specifications. This week, it announced a new product line. From their site (http://www.st.com/content/st_com/en/about/media-center/press-item.html/p3859.html): “…STMicroelect… READ MOREDate Published: November, 18, 2016
TCG and its members created a non-proprietary way to ensure data on storage devices, such as hard disk drives or solid state (flash) drives. The industry specifications for self-encrypting drives (http://www.trustedcomputinggroup.org/work-groups/storage/)… READ MOREDate Published: October, 13, 2016
Trusted Computing Group’s TPM 2.0 Library Specification, recently adopted as an ISO/IEC 11889:2015 standard (http://www.trustedcomputinggroup.org/tpm-2-0-library-specification-approved-isoiec-international-standard/), is a new way to implement TPM and t… READ MOREDate Published: September, 27, 2016
Even as enterprises make progress on securing traditional IT networks, the OT, or operational technology, side of networks remain surprisingly vulnerable. Why? In the IT world, administrators regularly patch, use more current versions of hardware and soft… READ MOREDate Published: September, 20, 2016
by Jun Takei, Intel Corporation 日本の情報セキュリティに多大なる貢献をされてきた奈良先端科学技術大学院大学の山口英先生が2016年5月9日に急逝されました。 先生のいままでの功績は多くの… READ MOREDate Published: September, 15, 2016
In the world of cybersecurity, there certainly seems to be lots of work to do - each day brings new breaches, attacks and vulnerabilities. While much of security involves human error or negligence, foundational security based on the concepts of trust can … READ MOREDate Published: September, 13, 2016
For several years, Security Ledger (https://securityledger.com) has been hosting the Security of Things Forum in the Boston area. This year, Christian Science Monitor is co-hosting and the line-up looks great - speakers will offer IoT security perspective… READ MOREDate Published: September, 08, 2016
As part of its ongoing webcast series, Trusted Computing Group and members will host a session Tuesday, Sept. 20, 9:00 a.m. Pacific/12:00 p.m. to address how to secure the IoT with strong device identity and techniques to securing IoT endpoints and the ro… READ MOREDate Published: September, 01, 2016
Manufacturers worldwide are deeply concerned about protecting their processes, intellectual property, products and brands. While hacking of baby monitors and thermostats might grab headlines, larger problems are looming as manufacturers of all kinds of it… READ MORE