Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Protecting the Healthcare Sector from Supply Chain Security Attacks

With a cyberattack occurring every 39 seconds, not only are they becoming more frequent, they are becoming more sophisticated and premeditated. Attackers have begun targeting supply chains, which is especially worrying as one attack can create a chain reaction and compromise a network of providers. [...]

Cybersecurity in the quantum age

A new era of computing requires a new kind of cryptography. Cybersecurity has become one of the hottest topics in the modern digital world. How to make cybersecurity solutions trustworthy is a highly relevant question. Cybersecurity solutions make use of cryptographic mechanisms, so trusting in t [...]

NIST seeks information on updating its Cybersecurity Framework

As it begins planning to revise its widely praised Cybersecurity Framework (CSF), the National Institute of Standards and Technology (NIST) has requested that interested parties supply comments on how NIST can improve the effectiveness of the CSF and its alignment with other cybersecurity resources. [...]

See More

TCG News Releases

New TCG guidance creates low-cost attestation architecture to establish trust in devices

December 12, 2022 – Accurately attesting the integrity of a device without a Trusted Platform Model (TPM) has been made possible with the latest Device Identifier Composition Engine (DICE) specification from Trusted Computing Group (TCG). By 2030, there is expected to be over 30 billion connect [...]

Celebrating success in the cybersecurity industry with the 2022 TCG Awards

 Beaverton, OR, USA, November 16, 2022 – Cybersecurity experts from across the Trusted Computing Group (TCG) have been recognised for their achievements and contributions to the industry at the TCG Annual Members Meeting Awards Ceremony in New Orleans. Paul England of Microsoft and Invited Exp [...]

TCG Japan Regional Forum shines spotlight on IoT security

Beaverton, OR, USA, June 29, 2022 – As society becomes increasingly dependent on IoT devices, the Japan Regional Forum (JRF) of the Trusted Computing Group (TCG) will host its 13th Open Workshop to discuss the latest security threats and issues, and how they can be addressed. During the free-to [...]

See More

Whitepapers & Guides

See More

Member News Releases

Huawei launches open-source Kunpeng Security Libraries project to enable trusted computing on ARM servers

Introduction The Kunpeng Security Libraries (KunpengSecL) open-source project provides basic security software components running on Huawei’s Kunpeng ARM processors used in the TaiShan server family. The project currently focuses on trusted computing capabilities such as remote attestation to emp [...]

Future-proof security solution: Infineon launches world’s first TPM with a PQC-protected firmware update mechanism

Munich, Germany – 15 February, 2022 – Quantum computing is expected to have a significant impact on cybersecurity, specifically on the confidentiality of encrypted data and on the integrity of digital signatures. To address these challenges, Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) is [...]

AMI Announces Support for Key Management Service (KMS) Protocol in Aptio V UEFI Firmware

NORCROSS, GEORGIA - AMI®, a global leader in powering, managing and securing the world's connected digital infrastructure through its BIOS, BMC and security solutions, is pleased to announce support for the Key Management Service (KMS) Protocol in its Aptio® V UEFI Firmware. UEFI system firmwar [...]

See More

Images & Graphics

See More