Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Providing a secure future for billions of IoT devices through cyber resilience

The Internet of Things (IoT) is rapidly increasing in popularity, with predictions that there will be 27.1 billion devices this year, according to Cisco, making it imperative that cyber resilience becomes a priority to ensure a safe future for all, says Rob Spiger, vice president of Trusted Compu [...]

Consider IoT TPM security to augment existing protection

Any organization that needs hardware-level security and uses IoT should consider integrating Trusted Platform Modules with their devices and network to boost their security posture. For more than 20 years, Trusted Platform Modules (TPMs) have been used in the cybersecurity community -- mainly i [...]

Space jam: why the military is prioritizing cybersecurity for space

Trusted Computing Group marketing workgroup chair Thorsten Stremlau says that security must be designed into satellite systems, so a level of trust is established between earthbound devices and satellites. “Trusted computing technology ensures the trustworthiness of devices, device identity and [...]

See More

TCG News Releases

Microsoft, Intel and Goldman Sachs to lead new TCG work group to tackle supply chain security challenges

Beaverton, OR, USA, October 19, 2021 – Trusted Computing Group (TCG) has today announced a new work group that will define how TCG technologies can be implemented to address supply chain security challenges. Led by representatives from Microsoft, Intel, and Goldman Sachs, the work group will creat [...]

TCG releases first security verification guide for enterprise systems with NIST

Beaverton, OR, USA, May 19, 2021 – IT administrators and manufacturers can now secure enterprise computing, with the latest specification from the Trusted Computing Group (TCG). This new guide verifies the trustworthiness of each end point, by allowing the integrity of devices and networks within [...]

TCG welcomes new member Goldman Sachs as it focuses on FinTech security for the first time

Beaverton, OR, USA, February 22, 2021 – Trusted Computing Group (TCG) has today announced its commitment to strengthening the financial services industry against attack, as worldwide banking institution, Goldman Sachs, joins TCG in the fight for cybersecurity. In a first for TCG, the organizati [...]

See More

Whitepapers & Guides

See More

Member News Releases

AMI Announces Support for Key Management Service (KMS) Protocol in Aptio V UEFI Firmware

NORCROSS, GEORGIA - AMI®, a global leader in powering, managing and securing the world's connected digital infrastructure through its BIOS, BMC and security solutions, is pleased to announce support for the Key Management Service (KMS) Protocol in its Aptio® V UEFI Firmware. UEFI system firmwar [...]

Intel Highlights Latest Security Investments at RSA 2020

SAN FRANCISCO, Feb. 26, 2020 – At the Intel Security Day event during RSA Conference 2020, Intel underscored its commitment to security with several announcements, including details on security capabilities coming in future products. At Intel, security is a fundamental and foundational element of [...]

American Megatrends supports BIOS passwords to be stored in the TPM NVRAM via new Aptio® V UEFI Firmware eModule

NORCROSS, GEORGIA: - American Megatrends International LLC (AMI), a global leader in BIOS and UEFI firmware, server and remote management tools, data storage products and unique solutions based on the Linux® and Android™ operating systems, is pleased to announce support for BIOS passwords to be s [...]

See More

Images & Graphics

See More