Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Good Girls Go to Heaven, but Girls In Cyber Go Everywhere…An Exclusive Interview with Lisa Lorenzin, Director, Emerging Technology Solutions, Americas at Zscaler

"And the good girls go to heaven, but the bad girls go everywhere..." – This is what I have read when I was trying to know Lisa better on her Twitter account. Controversial, courageous, and ambitious, this woman has a lot to share [...]

Protecting Routers and Other Network Equipment

While attacks and threats on PCs and servers have been well documented and addressed by a variety of solutions for many years, only recently have vulnerabilities of other parts of Internet of Things (IoT) systems been recognized – and exploited [...]

Establishing Unique Identity and Security for Cost-Sensitive Embedded Products

The Trusted Computing Group’s DICE Architecture offers a platform that provides a unique identity to protect vehicles and most other embedded systems. [...]

See More

TCG News Releases

TCG Members Infineon, Microsoft and OnBoard Security to Host Security Solutions Workshop and Demonstrations at Internet of Things North America

PORTLAND, Ore., April 12, 2018 – Trusted Computing Group (TCG) and members Infineon, Microsoft and OnBoard Security will host a workshop on securing the vulnerable IoT on  May 30, 2018, at the Internet of Things North America (@IOTShow) conference. IoT and embedded systems and networks remain [...]

Trusted Computing Group Announces Storage Certification Program and Releases Storage Test Cases Specification

Test Cases to Ensure Compliance and Interoperability PORTLAND, Ore., March 27, 2018 – Trusted Computing Group (TCG) today announced the availability of its storage certification program for self-encrypting drives (SEDs) based on TCG specifications. The compliance tests, based on the TCG Stor [...]

Trusted Computing Group Welcomes Korea Internet and Security Agency (KISA) as a Government Liaison Member

KISA to Contribute to IoT security and Resiliency and Global Standards Seoul, Korea, March 26, 2018 – Trusted Computing Group (TCG), a global security standards organization and an approved Publicly Available Specification Submitter for ISO/IEC JCT 1, today announced the Korea Internet and [...]

See More

Whitepapers & Guides

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at [...]

TCG ICS Specification for Network Segmentation

Download PDF (0.31 MB) [...]

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previou [...]

See More

Member News Releases

NXP Integrates Layerscape Family of Arm-based Processors with Microsoft Azure IoT for Secure Edge Computing

NUREMBERG, Germany, Feb. 27, 2018 (GLOBE NEWSWIRE) -- NXP Semiconductors N.V. (NASDAQ:NXPI), a worldwide leader in advanced secure connectivity solutions, today announced that its NXP Layerscape System-on-Chip (SoC) platforms are integrated with Microsoft Azure IoT Edge. The result is that developer [...]

OnBoard Security and Nuvoton Technology Form Trusted Computing Partnership

OnBoard Security announced today that they are partnering with Nuvoton Technology to incorporate greater security into the Internet of Things (IoT). OnBoard Security’s TrustSentinel TSS 2.0 now supports Nuvoton’s NPCT family of Trusted Platform Modules (TPM) and eliminates the need for software [...]

Wibu-Systems and Winbond at Embedded World to represent the Trusted Computing Group

Karlsruhe, Germany – Trusted Computing Group, a not-for-profit organization that develops, defines and promotes open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms, in partnership with OpenSystems Media, will [...]

See More

Images & Graphics

Where Trust Begins

View this infographic on protecting the connected ecosystem. [...]

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0. [...]

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.