Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

WIBU – Monetizing the Industrial IoT with a Secure License-based Economy

Oliver Winzenried, CEO and Founder of Wibu-Systems talks about monetizing the Industrial IoT with a secure License-based economy. [...]

Embedded Insiders Podcast – Secure Your Network, No Matter the Cost

As the old axiom goes, “if you have to ask the price, then you can’t afford it.” I’m here to say that nothing could be further from the truth when it comes to securing your network. In fact, depending on the data that you’re protecting, it’s possible that there’s no cost that’s too h [...]

TCG Rolls the DICE for Automotive Security

The Trusted Computing Group’s Device Identifier Composition Engine (DICE) offers a platform for providing privacy and security in an automotive environment. [...]

See More

TCG News Releases


Members to Discuss Foundational Trust and Security for the Industrial IoT at Oct. 3 Session, IoT Solutions World Conference PORTLAND, Ore., Sept. 18, 2017 – Trusted Computing Group (@TrustedComputin) has released the Device Identifier Composition Engine (DICE) Architecture for securing resource [...]

TCG and Members GE, Infineon, Microsoft, Onboard Security and WIBU-Systems to host Industrial Security Session at IoT Solutions World Congress

October 3 Event Will Address Ensuring Security and Integrity of Industrial Connected Things PORTLAND, Ore., Aug. 31, 2017 – Trusted Computing Group (@TrustedComputin), with members GE, Infineon, Microsoft, OnBoard Security and Wibu-Systems, will host a free session at the IoT Solutions World Co [...]

Data Protection and Security, From Enterprise To Autos, Focus of TCG at Flash Memory Summit

Demos and Presentations to Address Securing Data Everywhere PORTLAND, Ore., July 31, 2017 – Trusted Computing Group (@TrustedComputin) and members will discuss and demonstrate how industry-standard self-encrypting drives (#SED) protect data at the Flash Memory Summit (#flashmem), Aug. 8-10, San [...]

See More

Whitepapers & Guides

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at [...]

TCG ICS Specification for Network Segmentation

Download PDF (0.31 MB) [...]

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previou [...]

See More

Member News Releases

Microsoft simplifies IoT further

The Internet of Things (IoT) is quickly becoming a critical aspect of doing business. In the same way that web, mobile and cloud technologies have powered digital transformation, IoT is the next big catalyst. [...]

Announcing new functionality to automatically provision devices to Azure IoT Hub

We’re announcing a great new service to Azure IoT Hub that allows customers to provision millions of devices in a secure and scalable manner. Azure IoT Hub Device Provisioning enables zero-touch provisioning to the right IoT hub without requiring human intervention, and is currently being used by [...]

Micron and Microsoft Announce Collaboration to Help Improve Internet of Things Security

HANNOVER, Germany, April 24, 2017 (GLOBE NEWSWIRE) -- Micron Technology (Nasdaq:MU) and Microsoft today announced a collaboration that aims to address the major challenge of providing trusted computing models for IoT deployments in industrial, automotive and consumer environments. As digitization an [...]

See More

Images & Graphics

Where Trust Begins

View this infographic on protecting the connected ecosystem. [...]

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0. [...]

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.