Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

WIBU – Monetizing the Industrial IoT with a Secure License-based Economy

Oliver Winzenried, CEO and Founder of Wibu-Systems talks about monetizing the Industrial IoT with a secure License-based economy. [...]

Embedded Insiders Podcast – Secure Your Network, No Matter the Cost

As the old axiom goes, “if you have to ask the price, then you can’t afford it.” I’m here to say that nothing could be further from the truth when it comes to securing your network. In fact, depending on the data that you’re protecting, it’s possible that there’s no cost that’s too h [...]

TCG Rolls the DICE for Automotive Security

The Trusted Computing Group’s Device Identifier Composition Engine (DICE) offers a platform for providing privacy and security in an automotive environment. [...]

See More

TCG News Releases

NETWORK SECURITY AND VISIBILITY GET BOOST WITH NEW TCG TRUSTED NETWORK COMMUNICATIONS (TNC) SPECIFICATIONS

PORTLAND, Ore., Nov. 17, 2017 – Trusted Computing Group (TCG) today announced the Trusted Network Communications (TNC) Architecture 2.0, which expands the use cases and capabilities of TNC and enables efficient network security solutions that are more resistant to outsider attacks and insider thre [...]

TRUSTED COMPUTING GROUP ADDS GE AND RAYTHEON CYBER SOLUTIONS AS BOARD ADVISORS

Recognizes Seven Members for Technical and Leadership Contributions PORTLAND, Ore., Nov. 1, 2017 -- Trusted Computing Group (@TrustedComputin) today announced it has elected two contributor advisors to its board of directors. The group also recognized seven members for their contributions, leader [...]

TRUSTED COMPUTING GROUP TO HOST WORKSHOP WITH DEMONSTRATIONS IN TOKYO TO ADDRESS FUTURE OUTLOOK OF IMPLEMENTATION OF TCG TECHNOLOGY

PORTLAND, Ore., Oct. 31, 2017 – Trusted Computing Group (TCG) and its Japan Regional Forum will host a workshop November 20, 2017, 13:30 – 19:30, at Akihabara UDX Next 1, Tokyo, to discuss and demonstrate security technologies, including trust and IoT security, securing the blockchain, TPM and o [...]

See More

Whitepapers & Guides

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at [...]

TCG ICS Specification for Network Segmentation

Download PDF (0.31 MB) [...]

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previou [...]

See More

Member News Releases

OnBoard Security Engineer Receives Prestigious TCG Key Contributor Award

The Trusted Computing Group (TCG) has awarded OnBoard Security Principal Software Engineer Michael Cox the 2017 Key Contributor Award. This award is presented in recognition of Cox’s longstanding contributions to the TCG, including his ongoing efforts in the TCG Software Stack (TSS) Working Group. [...]

Winbond Introduces TrustMETM Secure Flash Memory Implementing the Trusted Computing Group (TCG) Device Identifier Composition Engine (DICE) Architecture

TAICHUNG, Taiwan – October 24, 2017 -- Winbond Electronics Corporation, a leading global supplier of semiconductor memory solutions, today announced an expansion of its TrustMETM Secure Flash products portfolio based on the Trusted Computing Group (TCG) Device Identifier Composition Engine (DICE) [...]

Microsoft simplifies IoT further

The Internet of Things (IoT) is quickly becoming a critical aspect of doing business. In the same way that web, mobile and cloud technologies have powered digital transformation, IoT is the next big catalyst. [...]

See More

Images & Graphics

Where Trust Begins

View this infographic on protecting the connected ecosystem. [...]

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0. [...]

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.