Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Looking into the seeds of time – Part X

Ahead of 2020, DW asked a whole host of individuals working in the tech space for their thoughts and observations on the business trends and technology developments likely to be major features of the year ahead. No one gave us the kitchen sink, but otherwise it seems that we’ve uncovered a broad s [...]

The dangers of IoT and AI

The risks of cybersecurity are more complex than ever. Due to the rise of the Internet of Things (IoT) and Artificial Intelligence (AI), by 2020 every person will generate 1.7 megabytes of information per second. As new technologies evolve, cyber criminals adapt and discover new hacking methods to a [...]

Open Access Government: A European Commission Perspective on Digital Transformation in Healthcare

See page 448 and learn from Thorsten Stremlau, Trusted Computing Group's Marketing Work Group Chair, on the importance of cybersecurity, as well as the risk of cyber-attacks and how best to protect against them. [...]

See More

TCG News Releases

Trusted Computing Group Honors KIOXIA’s Hiroshi Isozaki for Contributions to Standards Development

SAN JOSE, Calif.--(BUSINESS WIRE)--The drive to secure and protect data in PCs and data centers shows no signs of slowing down, and KIOXIA continues to lead the way when it comes to SSD security. KIOXIA America, Inc. (formerly Toshiba Memory America, Inc.) today announced that Hiroshi Isozaki, chief [...]

TCG Japan Regional Forum Open Workshop to build security resilience in an increasingly connected world

Save your seat for the free-to-attend annual Open Workshop, ‘Beyond Security by Design required in the IoT Era,’ on Wednesday, December 18 at Akihabara UDX in Tokyo Chiyoda City, Tokyo, 27 November 2019: As all sectors of society enter the Internet of Things (IoT) era, Trusted Computing Grou [...]

One-time security installations are not enough to protect mobile devices against growing threats, says TCG

Los Angeles, California, October 22, 2019 – Mobile device designers and operating system manufacturers need to provide a strong foundation for secure software and firmware updates throughout the lifetime of products – not just at the start, Ira McDonald, Co-Chair of Trusted Computing Group’s ( [...]

See More

Whitepapers & Guides

See More

Member News Releases

American Megatrends supports BIOS passwords to be stored in the TPM NVRAM via new Aptio® V UEFI Firmware eModule

NORCROSS, GEORGIA: - American Megatrends International LLC (AMI), a global leader in BIOS and UEFI firmware, server and remote management tools, data storage products and unique solutions based on the Linux® and Android™ operating systems, is pleased to announce support for BIOS passwords to be s [...]

Protecting communication within the smart factory and to the cloud: Infineon presents the world’s first TPM 2.0 for Industry 4.0

Munich, Germany – 27 March 2019 – Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) presents the world’s first Trusted Platform Module (TPM) specifically for industrial applications at this year’s Hannover Messe (Hannover, Germany, 1-5 April 2019). The OPTIGA™ TPM SLM 9670 protects the in [...]

AMI Presents on TPM Usage at UEFI Plugfest

HPBird Chen presents at AMI's UEFI plugfest on TPM usage in presentation titled 'Advanced Trusted Platform Module (TPM) Usage'. Download the full presentation here: https://www.uefi.org/sites/default/files/resources/UEFI_Plugfest_Advanced_TPM_Usage_Fall_2018.pdf See a full list of all presenta [...]

See More

Images & Graphics

See More