Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

How Healthy Is Your Web of Connected Devices?

By: Tom Brostrom In recent years, the evolution of the Internet of Things (IoT) has seen an explosion in the number of devices connected to the Internet—a trend which is set to continue long into the future with the development of new applications driven by connected homes, smart cities and aut [...]

Trusted Computing Group meets in Toronto to discuss security standards

Representatives of some of the biggest names in computing have been quietly meeting in Toronto this week to discuss some of the smallest but vital intricacies of device security. The Trusted Computing Group, whose open standards are used to build security chips found in motherboards, routers, swi [...]

Hardware-based encryption is the key to future proofing data protection concerns

With recent changes to data protection laws, the data protection landscape is rapidly changing in scope, breadth and depth. Data protection is no longer simply a part of risk management, but also governance and compliance – meaning organizations today must keep up with all that is happening in the [...]

See More

TCG News Releases

One-time security installations are not enough to protect mobile devices against growing threats, says TCG

Los Angeles, California, October 22, 2019 – Mobile device designers and operating system manufacturers need to provide a strong foundation for secure software and firmware updates throughout the lifetime of products – not just at the start, Ira McDonald, Co-Chair of Trusted Computing Group’s ( [...]

Trusted Computing Group accelerates cybersecurity innovation as world enters IoT era

Toronto, Canada, October 15, 2019 – Following 20 years of innovation and adoption of trusted computing standards and specifications, Trusted Computing Group is commemorating its 20th year anniversary whilst planning for the most critical time of all, the Internet of Things (IoT) era. Celebratin [...]

A one-size-fits-all approach will not be enough to secure the IoT, says TCG

Steve Hanna, Co-chair of TCG’s Embedded Systems Work Group San Jose, California, June 26, 2019 – Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach – and every kind of connected object must be assessed individually, the Co-chair of Tru [...]

See More

Whitepapers & Guides

See More

Member News Releases

American Megatrends supports BIOS passwords to be stored in the TPM NVRAM via new Aptio® V UEFI Firmware eModule

NORCROSS, GEORGIA: - American Megatrends International LLC (AMI), a global leader in BIOS and UEFI firmware, server and remote management tools, data storage products and unique solutions based on the Linux® and Android™ operating systems, is pleased to announce support for BIOS passwords to be s [...]

Protecting communication within the smart factory and to the cloud: Infineon presents the world’s first TPM 2.0 for Industry 4.0

Munich, Germany – 27 March 2019 – Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) presents the world’s first Trusted Platform Module (TPM) specifically for industrial applications at this year’s Hannover Messe (Hannover, Germany, 1-5 April 2019). The OPTIGA™ TPM SLM 9670 protects the in [...]

AMI Presents on TPM Usage at UEFI Plugfest

HPBird Chen presents at AMI's UEFI plugfest on TPM usage in presentation titled 'Advanced Trusted Platform Module (TPM) Usage'. Download the full presentation here: https://www.uefi.org/sites/default/files/resources/UEFI_Plugfest_Advanced_TPM_Usage_Fall_2018.pdf See a full list of all presenta [...]

See More

Images & Graphics

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.