Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Defeating the Rise of Cyber Threats with Latest TPM 2.0 Specification

With more than 21 billion Internet of Things (IoT) devices expected to be in use by 2025, all with varying use-cases and increasing levels of dependency, it is critical the cyber security industry has the right tools to fight off the growing sophistication of worldwide threats. According to Gartner [...]

IoT Security Standards & Collaboration

The demand for connected devices is seemingly insatiable. Based on most estimates, there are billions of connected devices online today, generating hundreds of billions of dollars in revenue, and this is estimated to grow to over $1 trillion across Internet of Things (IoT) market segments by 2026. [...]

The Benefits of Trust in the IoT Era

With more than 21 billion Internet of Things (IoT) devices expected to be deployed by 2025, according to antivirus and anti-malware security specialist Norton, and with very little or no security hardware running on these devices, more must be done to create a safe and secure digital ecosystem. Whe [...]

See More

TCG News Releases

Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things

In this Spotlight Edition of The Security Ledger Podcast, sponsored by Trusted Computing Group (TCG), we’re joined by Intel Fellow Claire Vishik to talk about the evolving concept of online “trust.” Vishik is a TCG Director and spent 14 years as the Director of Trusted Technologies at Inte [...]

TCG propels security for embedded, automotive and IoT systems with complete TPM 2.0 Software Stack

Beaverton, OR, USA, June 23, 2020 - Security for millions of devices across worldwide markets has been enhanced today as the Trusted Computing Group (TCG) releases its latest specification for the latest Trusted Platform Module (TPM 2.0) technology: the Feature Application Programming Interface (FAP [...]

TCG addresses the rise in cybersecurity threats with critical new features to its TPM 2.0 specification

Cybersecurity is taking a huge stride forward, as the Trusted Computing Group (TCG) today released its TPM 2.0 Library specification Revision 1.59 – providing necessary updates to the previously published TPM specification to combat the growing sophistication of cybersecurity threats worldwide. [...]

See More

Whitepapers & Guides

See More

Member News Releases

AMI Announces Support for Key Management Service (KMS) Protocol in Aptio V UEFI Firmware

NORCROSS, GEORGIA - AMI®, a global leader in powering, managing and securing the world's connected digital infrastructure through its BIOS, BMC and security solutions, is pleased to announce support for the Key Management Service (KMS) Protocol in its Aptio® V UEFI Firmware. UEFI system firmwar [...]

Intel Highlights Latest Security Investments at RSA 2020

SAN FRANCISCO, Feb. 26, 2020 – At the Intel Security Day event during RSA Conference 2020, Intel underscored its commitment to security with several announcements, including details on security capabilities coming in future products. At Intel, security is a fundamental and foundational element of [...]

American Megatrends supports BIOS passwords to be stored in the TPM NVRAM via new Aptio® V UEFI Firmware eModule

NORCROSS, GEORGIA: - American Megatrends International LLC (AMI), a global leader in BIOS and UEFI firmware, server and remote management tools, data storage products and unique solutions based on the Linux® and Android™ operating systems, is pleased to announce support for BIOS passwords to be s [...]

See More

Images & Graphics

See More