Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

IoT Time Podcast S.2 Ep.33 Trusted Computing Group

On this episode of the IoT Time Podcast, Ken Briodagh sits down with Steve Hanna, chair of TCG’s embedded systems and IoT work groups, and principal at Infineon where he’s focused on IoT security, to talk about IOT and network security and the IoT Evolution Expo. [...]

Five Minutes With…Bill Diotte, CEO, Mocana

Hacking continues and breeches still occur, regardless of how much emphasis we put on security. Why is that? Is it simply that the hackers are smarter than the folks designing in the security? That’s the question I asked Bill Diotte, the CEO of Mocana, one of the leaders in IoT security, in this w [...]

Can I Really Trust Your Embedded Device – RTC Magazine

Read Steve Hanna of Infineon and Stacy Cannady of Cisco Systems most recent article in RTC Magazine on page 30. [...]

See More

TCG News Releases

TCG to Demonstrate IoT and Network Security Solutions at InterOp ITX May 16-18, 2017

PORTLAND, ORE. April 27, 2017 -- Trusted Computing Group (TCG) and members will demonstrate standards-based solutions for the Internet of Things and network security at the May Interop ITX conference and exhibits (@Interop) in Las Vegas. TCG members CoSoSys, Mocana, OnBoard Security and Temper [...]

可信计算组与中国全国信息安全标准化技术委员会于4月6日共同主办国际可信计算与安全创新峰会

俄勒冈州波特兰--(美国商业资讯)--应对安全与隐私挑战的想法、技术、研究和切实可行的解决方案将在国际可信计算与安全创新峰会(International Trusted Computing and Security Innovation Summit)上分享,本届峰会由可信计算组(Trusted Computing G [...]

Trusted Computing Group to Co-Host International Trusted Computing and Security Innovation Summit April 6th with China National Security Standards Committee

PORTLAND, Ore.--(BUSINESS WIRE)— Ideas, techniques, research and practical solutions to address security and privacy challenges will be shared at the International Trusted Computing and Security Innovation Summit hosted by the Trusted Computing Group (TCG) and TC 260 (China National Security Sta [...]

See More

Whitepapers & Guides

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at [...]

TCG ICS Specification for Network Segmentation

Download PDF (0.31 MB) [...]

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previou [...]

See More

Member News Releases

Micron and Microsoft Announce Collaboration to Help Improve Internet of Things Security

HANNOVER, Germany, April 24, 2017 (GLOBE NEWSWIRE) -- Micron Technology (Nasdaq:MU) and Microsoft today announced a collaboration that aims to address the major challenge of providing trusted computing models for IoT deployments in industrial, automotive and consumer environments. As digitization an [...]

Azure IoT supports new security hardware to strengthen IoT security

Microsoft’s commitment to leadership in IoT security continues with Azure IoT’s improving the level of trust and confidence in securing IoT deployments.  Azure IoT now supports Device Identity Composition Engine (DICE) and many different kinds of Hardware Security Modules (HSMs). DICE is an [...]

CES 2017: Infineon secures systems from wearables to automotive

As it has been for much of the last year, security was well addressed at CES 2017 in everything from consumer wearables to sophisticated automotive designs. Early in the show I got to see both ends of the security spectrum when visiting the Infineon booth, where Josef Kohn, Marketing and Program Man [...]

See More

Images & Graphics

Where Trust Begins

View this infographic on protecting the connected ecosystem. [...]

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0. [...]

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.