Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Securing a factory’s OT network and the role of trust

When leaders have advanced knowledge of how and where their cyber defenses will be attacked, they mobilize resources to reinforce the targeted area. This strategy applies to both war and to hacking attacks. For manufacturing companies, a common weak link in their enterprise network is their producti [...]

Torvalds calls out developers who ‘screw all the rules and processes’ in place for Linux merges

Linus Torvalds has taken aim at developers who ‘screw all the rules and processes’ in place for Linux merges. [...]

ClearCube R3161D Blade PC combines the performance of Intel Core i5 processors the management features of Intel’ AMT and the security of Intel TPM

ClearCube R3161D Blade PCs with integrated PCoIP host cards deliver excellent datacenter-to-desktop remote performance. The R3161D Blade PC is the fourth-generation ClearCube R-Series design, providing eight powerful i5 computers in a 3U rack space. [...]

See More

TCG News Releases

What Embedded and IoT Developers Think About IoT Security: A Look at the ECD and TCG Survey

PORTLAND, Ore., March 27, 2017 -- Stacy Cannady, Cisco Systems and Trusted Computing Group (TCG), and Richard Nass, Embedded Computing Design/OpenSystems Media, will host a webcast Monday, April 24, 10 a.m. Pacific/1:00 p.m. Eastern to talk about the hottest issue today in the IoT and embedded desig [...]

Learn How to Use the Trusted Platform Module (TPM) for Security in Webcast January 31

PORTLAND, ORE. Jan. 23, 2016 -- Trusted Computing Group (TCG) and experts from GE and Security Innovation will talk about the features, benefits, and application of the Trusted Platform Module (TPM) for enterprise, embedded systems and Internet of Things security in a January 31, 2017, webcast. [...]

Trusted Computing Group to Discuss and Demonstrate Security of the Internet of Things at ESC Silicon Valley 2016

PORTLAND, Ore., Dec. 2, 2016 – Trusted Computing Group and its members will demonstrate securing the Internet of Things with foundational trust at the Dec. 6-8, 2016 Embedded Systems Conference (ESC) Silicon Valley, San Jose, Calif. In Booth 1820, Mocana will show implementation of TPM security [...]

See More

Whitepapers & Guides

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at [...]

TCG ICS Specification for Network Segmentation

Download PDF (0.31 MB) [...]

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previou [...]

See More

Member News Releases

CES 2017: Infineon secures systems from wearables to automotive

As it has been for much of the last year, security was well addressed at CES 2017 in everything from consumer wearables to sophisticated automotive designs. Early in the show I got to see both ends of the security spectrum when visiting the Infineon booth, where Josef Kohn, Marketing and Program Man [...]

STMicroelectronics Boosts Trusted Computing with New Advanced Security Modules

   Expansion of STSAFE family with latest Trusted Platform Modules (TPMs) extends support for state-of-the-art hardware-based online security Largest on-chip memory in the market provides greater storage for sensitive data Devices are certified to highest security-industry standards [...]

Security Innovation Engineer Receives Prestigious TCG Key Contributor Award

FOR IMMEDIATE RELEASE Rebecca Leitch Marketing Communications Manager Security Innovation 978-267-1631 [...]

See More

Images & Graphics

Where Trust Begins

View this infographic on protecting the connected ecosystem. [...]

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0. [...]

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.