End-to-End IoT Security Starts with the Infrastructure

Date Published: January, 01, 2016

It’s been three months into your embedded development, and the engineering team just reported the security architecture design is complete. Hardware, operating system, algorithms, protocols, everything is ready to start developing—that is, until someone asks “How are we going to get keys into this thing?”

With no resources left to allocate, the answer is usually, “Well… that’s a manufacturing issue.” While this may satisfy the overworked development team, deferring infrastructure development jeopardizes the overall success and security of the product. Here are a few problems that can occur as a result . . .

Read Entire Article


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More