Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

NIST seeks information on updating its Cybersecurity Framework

As it begins planning to revise its widely praised Cybersecurity Framework (CSF), the National Institute of Standards and Technology (NIST) has requested that interested parties supply comments on how NIST can improve the effectiveness of the CSF and its alignment with other cybersecurity resources. [...]

Tackling supply chain security head-on

Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or protect against them. Supply chain threats are a risk on a global scale and are now affecting a wide range of industries and o [...]

Data-at-rest security is essential for the successful operation of businesses worldwide

More internet traffic is predicted to be created in 2022 than in the previous 32 years combined. Our digital societies rely on the security of data stored in data centers more than ever before. As a result, it is becoming increasingly important for there to be an improvement in the security of sto [...]

See More

TCG News Releases

TCG Japan Regional Forum shines spotlight on IoT security

Beaverton, OR, USA, June 29, 2022 – As society becomes increasingly dependent on IoT devices, the Japan Regional Forum (JRF) of the Trusted Computing Group (TCG) will host its 13th Open Workshop to discuss the latest security threats and issues, and how they can be addressed. During the free-to [...]

New TCG guidance simplifies creating cyber resilient devices

Beaverton, OR, USA, March 30, 2022 – The prevention of cyber attacks throughout a device’s lifetime has been made easier today, as the Trusted Computing Group (TCG) released its specification: Cyber Resilient Module and Building Block Requirements. With society becoming increasingly connected [...]

DMTF Shares Industry Support for its Platform Security Standards

PORTLAND, Ore. – January 11, 2022 – DMTF today announced that its Security Protocol and Data Model (SPDM) specifications have garnered industry support and are actively helping to solve customer and end user concerns with a standardized platform security protocol. Developed by the Security Task [...]

See More

Whitepapers & Guides

See More

Member News Releases

Huawei launches open-source Kunpeng Security Libraries project to enable trusted computing on ARM servers

Introduction The Kunpeng Security Libraries (KunpengSecL) open-source project provides basic security software components running on Huawei’s Kunpeng ARM processors used in the TaiShan server family. The project currently focuses on trusted computing capabilities such as remote attestation to emp [...]

Future-proof security solution: Infineon launches world’s first TPM with a PQC-protected firmware update mechanism

Munich, Germany – 15 February, 2022 – Quantum computing is expected to have a significant impact on cybersecurity, specifically on the confidentiality of encrypted data and on the integrity of digital signatures. To address these challenges, Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) is [...]

AMI Announces Support for Key Management Service (KMS) Protocol in Aptio V UEFI Firmware

NORCROSS, GEORGIA - AMI®, a global leader in powering, managing and securing the world's connected digital infrastructure through its BIOS, BMC and security solutions, is pleased to announce support for the Key Management Service (KMS) Protocol in its Aptio® V UEFI Firmware. UEFI system firmwar [...]

See More

Images & Graphics

See More