Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Ensuring cybersecurity resilience in an ultra-connected world

The development of the Internet of Things (IoT), Artificial Intelligence (AI), the cloud and big data have enabled devices that started out as unbelievable concepts to become a reality. From a consumer standpoint, these ever-increasing trends are often taken for granted as people become accustomed t [...]

Trust and Transparency in the Hardware Supply Chain

Organizations invest a lot of resources and effort to secure and protect their devices and IT environment, but there is growing concern over the parts that make up the equipment. The supply chain exposes organizations to risk because counterfeit parts may create safety hazards, cause the failure of [...]

IoT-verdenen gjenoppdager PC-problemene

IoT-verdenen gjenoppdager nå de samme problemene PC- og IKT-industrien hadde når det gjelder sikkerhet. Derfor har vi videreutviklet TPM for dette markedet [...]

See More

TCG News Releases

TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems

Beaverton, OR, USA, February 10, 2020 – Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems. Firmware an [...]

Trusted Computing Group Honors KIOXIA’s Hiroshi Isozaki for Contributions to Standards Development

SAN JOSE, Calif.--(BUSINESS WIRE)--The drive to secure and protect data in PCs and data centers shows no signs of slowing down, and KIOXIA continues to lead the way when it comes to SSD security. KIOXIA America, Inc. (formerly Toshiba Memory America, Inc.) today announced that Hiroshi Isozaki, chief [...]

TCG Japan Regional Forum Open Workshop to build security resilience in an increasingly connected world

Save your seat for the free-to-attend annual Open Workshop, ‘Beyond Security by Design required in the IoT Era,’ on Wednesday, December 18 at Akihabara UDX in Tokyo Chiyoda City, Tokyo, 27 November 2019: As all sectors of society enter the Internet of Things (IoT) era, Trusted Computing Grou [...]

See More

Whitepapers & Guides

See More

Member News Releases

AMI Announces Support for Key Management Service (KMS) Protocol in Aptio V UEFI Firmware

NORCROSS, GEORGIA - AMI®, a global leader in powering, managing and securing the world's connected digital infrastructure through its BIOS, BMC and security solutions, is pleased to announce support for the Key Management Service (KMS) Protocol in its Aptio® V UEFI Firmware. UEFI system firmwar [...]

Intel Highlights Latest Security Investments at RSA 2020

SAN FRANCISCO, Feb. 26, 2020 – At the Intel Security Day event during RSA Conference 2020, Intel underscored its commitment to security with several announcements, including details on security capabilities coming in future products. At Intel, security is a fundamental and foundational element of [...]

American Megatrends supports BIOS passwords to be stored in the TPM NVRAM via new Aptio® V UEFI Firmware eModule

NORCROSS, GEORGIA: - American Megatrends International LLC (AMI), a global leader in BIOS and UEFI firmware, server and remote management tools, data storage products and unique solutions based on the Linux® and Android™ operating systems, is pleased to announce support for BIOS passwords to be s [...]

See More

Images & Graphics

See More