Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

World’s First TPM for Cybersecurity In the Connected Car

Infineon Technologies says it is enabling a “crucial” step toward greater cybersecurity in the connected car, as the world’s first semiconductor manufacturer to put a Trusted Platform Module (TPM) specifically for automotive applications on the market. [...]

Open Source Tools, New Guides to Using Trusted Computing Published on TCG Developer Site

Earlier this year, TCG launched a new site that aggregates a number of available tools and information to help designers and developers implement trusted computing, whether in embedded and IOT systems or enterprise ones. That site can be found at https://develop.trustedcomputinggroup.org. TCG pa [...]

Securing Industrial IoT Sensors, part 3: Foundational Trust for IoT

At a Sensors Expo 2018 workshop in San Jose, CA, with Embedded Computing Design, Trusted Computing Group (TCG) work group members presented information about TCG’s Trusted Platform Module (TPM) for network security, the DICE lightweight hardware root of trust and the Trusted Software Stack (TSS 2. [...]

See More

TCG News Releases

Spotlight Podcast: Fixing Supply Chain Hacks with Strong Device Identities

Supply chain hacks like ME Docs and ASUS aren’t inevitable. In this Spotlight Podcast, sponsored by Trusted Computing Group, I speak with Dennis Mattoon, a Principal Researcher at Microsoft Research and the Chairman of the Trusted Computing Group’s DICE Architectures Working Group* about how str [...]

NSA Software Can Help Secure the Supply Chain

The National Security Agency (NSA) and the Trusted Computing Group (TCG) industry consortium have come up with validation software that can be used with any device and could go a long way to securing the supply chain for computing devices. [...]

Protecting Attack Surfaces with Trusted Solutions

The internet is a very dangerous place for connected things. Those with inadequate security are prime targets for hackers to gain network access. For stronger security in the Internet of Things (IoT) and industrial control system applications, Mocana recently introduced Mocana TPM 2.0 (TrustPoint Io [...]

See More

Whitepapers & Guides

See More

Member News Releases

Protecting communication within the smart factory and to the cloud: Infineon presents the world’s first TPM 2.0 for Industry 4.0

Munich, Germany – 27 March 2019 – Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) presents the world’s first Trusted Platform Module (TPM) specifically for industrial applications at this year’s Hannover Messe (Hannover, Germany, 1-5 April 2019). The OPTIGA™ TPM SLM 9670 protects the in [...]

AMI Presents on TPM Usage at UEFI Plugfest

HPBird Chen presents at AMI's UEFI plugfest on TPM usage in presentation titled 'Advanced Trusted Platform Module (TPM) Usage'. Download the full presentation here: https://www.uefi.org/sites/default/files/resources/UEFI_Plugfest_Advanced_TPM_Usage_Fall_2018.pdf See a full list of all presenta [...]

Wibu-Systems at electronica: The future of electronics and IIoT are intertwined

Karlsruhe, Germany – At today’s electronica opening day in Munich, Germany, Wibu-Systems comes with its IoT enabling technology to support all embedded systems, automotive, medical electronics, smart industry, and AI developers and makers in their quest for highly secure and profitable solutions [...]

See More

Images & Graphics

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.