TCG’s Steve Hanna often speaks and writes on the concepts of trusted computing and its role in helping secure the very vulnerable IoT and embedded systems in his role as co-chair of several TCG work groups. This week, Steve sits down with Ken Briodagh, of IoT Evolution, to look at some of the hottest issues around IoT security – including securing network equipment, in a new podcast available at http://www.iotevolutionworld.com/iot/articles/432973-iot-time-podcast-s2-ep33-trusted-computing-group.htm# and on iTunes and other podcast applications.
The episode is sponsored by IoT Evolution Expo, the leading IoT-focused enterprise event in the Internet of Things, to be held July 17 to 20 at Caesars Palace, Las Vegas. TCG will be there in Booth #307 (https://trustedcomputinggroup.org/press-rooms/events/iot-evolution-expo-2017/) to demonstrate how to use trust and its role in securing smart buildings and the industrial IoT.
You can also catch Steve in person at the IoT Evolution Expo:
Securing the Industrial IoT: Wednesday, July 19th 1:30pm
IoT Security Strategies Mastering the Zones of Trust: Wednesday, July 19th 5:00pm
Register using code TCG25 before June 30 for discounted super passes to catch all the demos and sessions. More info at https://trustedcomputinggroup.org/press-rooms/events/iot-evolution-expo-2017/.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.