Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Interop ITX: More than 40 Leading Technology Companies Announce New Products, Services, Demos & More

SAN FRANCISCO, May 8, 2017 /PRNewswire/ -- Interop ITX, the independent conference for tech leaders, today unveils more than 40 announcements from leading solution providers participating at its event next week. The event's Business Hall will welcome more than 100 leading and emerging technology co [...]

Securing a factory’s OT network and the role of trust

When leaders have advanced knowledge of how and where their cyber defenses will be attacked, they mobilize resources to reinforce the targeted area. This strategy applies to both war and to hacking attacks. For manufacturing companies, a common weak link in their enterprise network is their producti [...]

Torvalds calls out developers who ‘screw all the rules and processes’ in place for Linux merges

Linus Torvalds has taken aim at developers who ‘screw all the rules and processes’ in place for Linux merges. [...]

See More

TCG News Releases

TCG to Demonstrate IoT and Network Security Solutions at InterOp ITX May 16-18, 2017

PORTLAND, ORE. April 27, 2017 -- Trusted Computing Group (TCG) and members will demonstrate standards-based solutions for the Internet of Things and network security at the May Interop ITX conference and exhibits (@Interop) in Las Vegas. TCG members CoSoSys, Mocana, OnBoard Security and Temper [...]

可信计算组与中国全国信息安全标准化技术委员会于4月6日共同主办国际可信计算与安全创新峰会

俄勒冈州波特兰--(美国商业资讯)--应对安全与隐私挑战的想法、技术、研究和切实可行的解决方案将在国际可信计算与安全创新峰会(International Trusted Computing and Security Innovation Summit)上分享,本届峰会由可信计算组(Trusted Computing G [...]

Trusted Computing Group to Co-Host International Trusted Computing and Security Innovation Summit April 6th with China National Security Standards Committee

PORTLAND, Ore.--(BUSINESS WIRE)— Ideas, techniques, research and practical solutions to address security and privacy challenges will be shared at the International Trusted Computing and Security Innovation Summit hosted by the Trusted Computing Group (TCG) and TC 260 (China National Security Sta [...]

See More

Whitepapers & Guides

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at [...]

TCG ICS Specification for Network Segmentation

Download PDF (0.31 MB) [...]

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previou [...]

See More

Member News Releases

Micron and Microsoft Announce Collaboration to Help Improve Internet of Things Security

HANNOVER, Germany, April 24, 2017 (GLOBE NEWSWIRE) -- Micron Technology (Nasdaq:MU) and Microsoft today announced a collaboration that aims to address the major challenge of providing trusted computing models for IoT deployments in industrial, automotive and consumer environments. As digitization an [...]

Azure IoT supports new security hardware to strengthen IoT security

Microsoft’s commitment to leadership in IoT security continues with Azure IoT’s improving the level of trust and confidence in securing IoT deployments.  Azure IoT now supports Device Identity Composition Engine (DICE) and many different kinds of Hardware Security Modules (HSMs). DICE is an [...]

CES 2017: Infineon secures systems from wearables to automotive

As it has been for much of the last year, security was well addressed at CES 2017 in everything from consumer wearables to sophisticated automotive designs. Early in the show I got to see both ends of the security spectrum when visiting the Infineon booth, where Josef Kohn, Marketing and Program Man [...]

See More

Images & Graphics

Where Trust Begins

View this infographic on protecting the connected ecosystem. [...]

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0. [...]

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.