TCG Blog

Trusted Computing Group Defines Authorization System for IF-MAP

Date Published: January, 01, 2015

The success of TCG’s IF-MAP has brought new challenges. IF-MAP is a protocol for dynamic data interchange among a wide variety of networking and security components. IF-MAP enables users to implement multi-vendor systems that provide coordinated defense… READ MORE

Network Security

Date Published: January, 01, 2015

31 October, 2014 Shouldn’t Security Be a Standard? Thanks, Atmel! The attacks and hacks keep coming. Atmel, a long-time TCG member and provider of the TPM, has commented in a new blog, “Shouldn’t Security Be a Standard?”. Indeed. As Atmel says,… READ MORE

Mobile Security

Date Published: January, 01, 2015

4 November, 2014 TPM as Virtual Smart Card - A No-Brainer? At the Trusted Cyber Collaboration Workshop, experts from Infineon, Wave Systems, HP, Wave Systems and Asguard Networks addressed a number of trending security issues and the role of trust in he… READ MORE

Certification

Date Published: January, 01, 2015

Certification TCG Certification Program The TCG has created these certification programs to promote consistent quality among products built to the TCG specifications.  This provides a useful tool to assist customers in verifying security and functiona… READ MORE

Events

Date Published: January, 01, 2015

Events subscribe RSS 12 Apr 2016 - 14 Apr 2016 Detroit, MI SAE World Congress 18 May 2016 - 20 May 2016 Ottawa, Ontario International Cryptographic Module Conference 2016 (ICMC) 13 Jun 2016 - 15 Jun 2016 San Mateo, CA Data Storage Innovation Conference … READ MORE

第6回公開ワークショップ

Date Published: December, 18, 2014

TCG日本支部 インテル株式会社 竹井 淳                       2014年12月18日 TCGの日本支部は設立したその年から毎年、公開のワークショップを開催してきました… READ MORE

TPM Improves Mobile Security with New Specification for Mobile Devices

Date Published: December, 16, 2014

It’s no secret that more users, including those in the workplace, rely on their mobile phones, tablets, PDAs, and similar mobile devices to get work done. Likewise, nobody argues that these devices are totally secure. There are many software-based secu… READ MORE

SWING – Storage Goes to Vegas Yet Again

Date Published: December, 10, 2014

Storage With Intense Network Growth, or SWING, is the theme of this year’s January 4-5, 2015 Storage Visions conference, which will host a number of storage technologies and products just ahead of the 2015 CES in Vegas. This conference traditionally ha… READ MORE

Tags:

An Apple a Day, or Preventative Compliance Testing of Network Security

Date Published: December, 05, 2014

Since first announcing its Trusted Network Connect (TNC) architecture, the Trusted Computing Group has worked steadily to improve the ability of network security and IT professionals to ensure that only healthy, known, and compliant devices can connect to… READ MORE

Self-Encrypting Drives Take off for Strong Data Protection

Date Published: March, 01, 2010

About a year ago, Trusted Computing Group released the Opal Security Subsystem Class Specification for PC clients and the Enterprise Security Subsystem Class Specification for data center storage. These specifications provide a blueprint for hard disk dri… READ MORE