Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

World’s First TPM for Cybersecurity In the Connected Car

Infineon Technologies says it is enabling a “crucial” step toward greater cybersecurity in the connected car, as the world’s first semiconductor manufacturer to put a Trusted Platform Module (TPM) specifically for automotive applications on the market. [...]

Open Source Tools, New Guides to Using Trusted Computing Published on TCG Developer Site

Earlier this year, TCG launched a new site that aggregates a number of available tools and information to help designers and developers implement trusted computing, whether in embedded and IOT systems or enterprise ones. That site can be found at TCG pa [...]

Securing Industrial IoT Sensors, part 3: Foundational Trust for IoT

At a Sensors Expo 2018 workshop in San Jose, CA, with Embedded Computing Design, Trusted Computing Group (TCG) work group members presented information about TCG’s Trusted Platform Module (TPM) for network security, the DICE lightweight hardware root of trust and the Trusted Software Stack (TSS 2. [...]

See More

TCG News Releases

Protecting Attack Surfaces with Trusted Solutions

The internet is a very dangerous place for connected things. Those with inadequate security are prime targets for hackers to gain network access. For stronger security in the Internet of Things (IoT) and industrial control system applications, Mocana recently introduced Mocana TPM 2.0 (TrustPoint Io [...]

TCG Announces New Work Group to Develop Cyber Resilient Technologies and Help Ensure Business Continuity

CONTACT: Stephanie Schultz, Trusted Computing Group. +1-503-619-0562 [email protected] Twitter: @TrustedComputin TCG ANNOUNCES NEW WORK GROUP TO DEVELOP CYBER RESILIENT TECHNOLOGIES AND HELP ENSURE BUSINESS CONTINUITY Group to Address Protecting Code, Detecting Vulnerabilities [...]

Add Trust to Your Supply Chain

With the expansion of data centers, cloud computing and the Internet of Things (“IoT”), ensuring trust in the supply chain has become more important than ever. From the sourcing of components used in manufacturing and platform assembly all the way through the distribution and logistics of the fi [...]

See More

Whitepapers & Guides

See More

Member News Releases

AMI Presents on TPM Usage at UEFI Plugfest

HPBird Chen presents at AMI's UEFI plugfest on TPM usage in presentation titled 'Advanced Trusted Platform Module (TPM) Usage'. Download the full presentation here: See a full list of all presenta [...]

Wibu-Systems at electronica: The future of electronics and IIoT are intertwined

Karlsruhe, Germany – At today’s electronica opening day in Munich, Germany, Wibu-Systems comes with its IoT enabling technology to support all embedded systems, automotive, medical electronics, smart industry, and AI developers and makers in their quest for highly secure and profitable solutions [...]

World’s First TPM for Cybersecurity In the Connected Car

Munich, Germany – 24 October 2018 – Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) is enabling a crucial step toward greater cybersecurity in the connected car. The Munich-based company is the world’s first semiconductor manufacturer to put a Trusted Platform Module (TPM) specifically for [...]

See More

Images & Graphics

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.