Using The TPM To Solve Today's Most Urgent Cybersecurity Problems

Date Published: May, 01, 2014

What: The Trusted Computing Group will host a free webinar on how to use the TPM, or Trusted Platform Module, to solve today’s cybersecurity problems.

With the recent discovery of the flaw in OpenSSL, Heartbleed, even the least computer-savvy among us has has seen the potential threat and damage caused by cybersecurity problems. And Heartbleed is just one of many attacks, breaches, viruses, and more that just keep coming.

How can enterprise users best protect against and mitigate many security issues?

This webinar will address a fundamental and key aspect to IT security: the root of trust. Embedded into devices, the root of trust, typically implemented by the TPM, provides a proven, safe foundation for more secure computing.

Learn the key concepts of trusted systems, why they’re critical to establishing security and supporting other solutions and what is new with the TPM.

When: Tues., May 20, 1:00 p.m. East/10:00 a.m. Pacific.

Where: To get more info or to register for the webinar, go to:

https://www.brighttalk.com/webcast/7423/109391

Tweet this: Join @TrustedComputin for May 20 webinar on locking down certificates, keys, PWs with root of trust #TPM #heartbleed http://bit.ly/1ttwuBx

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more