Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

A detailed guide to BitLocker for Windows 11 users

The information your computing device contains today is more important than the actual device itself, so it is important to protect it from unauthorized access. While there are several third-party apps to help you with this, Windows has its own built-in encryption tool, BitLocker. BitLocker works [...]

Protecting the Healthcare Sector from Supply Chain Security Attacks

With a cyberattack occurring every 39 seconds, not only are they becoming more frequent, they are becoming more sophisticated and premeditated. Attackers have begun targeting supply chains, which is especially worrying as one attack can create a chain reaction and compromise a network of providers. [...]

Cybersecurity in the quantum age

A new era of computing requires a new kind of cryptography. Cybersecurity has become one of the hottest topics in the modern digital world. How to make cybersecurity solutions trustworthy is a highly relevant question. Cybersecurity solutions make use of cryptographic mechanisms, so trusting in t [...]

See More

TCG News Releases

New JRF-TCG Workshop to Deliver Next Generation Cyber Security for Japan

このプレスリリースを日本語でご覧になるには、ここをクリックしてください: Protecting companies and public sector organisations from cyber attacks will be the key topic of an open workshop being held by TCG’s Jap [...]

JRF-TCG ワークショップを開催 日本に向けた次世代サイバーセキュリティ

To view this Press Release in English, please click here: TCG 日本支部(JRF)は、 2 月29 日、ヒルトン東京にて公開ワークショップを開催します。同イベン� [...]

TCG Appoints New President and Vice President to Drive Trusted Computing Adoption Across the Globe

The Trusted Computing Group (TCG) has today announced the appointment of Joe Pennisi as the new President and Chairman of the Board of Directors. Previously having served as a Board member and Treasurer within the organization, Pennisi has been entrusted to lead the TCG at a transformative time f [...]

See More

Whitepapers & Guides

Overcoming threats to Vehicle Security with Secure Role and Rights Management

Introduction The rise of fully autonomous vehicles may soon render car ownership obsolete, as ride-sharing companies like Uber embrace the concept of driverless cars. To survive, automotive manufacturers must develop business models that allow feature activation to be tied both to the user as wel [...]

See More

Member News Releases

Huawei launches open-source Kunpeng Security Libraries project to enable trusted computing on ARM servers

Introduction The Kunpeng Security Libraries (KunpengSecL) open-source project provides basic security software components running on Huawei’s Kunpeng ARM processors used in the TaiShan server family. The project currently focuses on trusted computing capabilities such as remote attestation to emp [...]

Future-proof security solution: Infineon launches world’s first TPM with a PQC-protected firmware update mechanism

Munich, Germany – 15 February, 2022 – Quantum computing is expected to have a significant impact on cybersecurity, specifically on the confidentiality of encrypted data and on the integrity of digital signatures. To address these challenges, Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) is [...]

AMI Announces Support for Key Management Service (KMS) Protocol in Aptio V UEFI Firmware

NORCROSS, GEORGIA - AMI®, a global leader in powering, managing and securing the world's connected digital infrastructure through its BIOS, BMC and security solutions, is pleased to announce support for the Key Management Service (KMS) Protocol in its Aptio® V UEFI Firmware. UEFI system firmwar [...]

See More

Images & Graphics

See More