Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

The importance of women in cybersecurity for innovation, investment and enrichment

According to Small Business Trends, 2018 saw 20 percent of all jobs in technology held by women. Of those companies in the Fortune 500 with three or more women in leading positions 66 percent saw an increase in ROI, found Women Who Tech. Since then, as we fly through 2020 into the new decade, wome [...]

Defeating the Rise of Cyber Threats with Latest TPM 2.0 Specification

With more than 21 billion Internet of Things (IoT) devices expected to be in use by 2025, all with varying use-cases and increasing levels of dependency, it is critical the cyber security industry has the right tools to fight off the growing sophistication of worldwide threats. According to Gartner [...]

IoT Security Standards & Collaboration

The demand for connected devices is seemingly insatiable. Based on most estimates, there are billions of connected devices online today, generating hundreds of billions of dollars in revenue, and this is estimated to grow to over $1 trillion across Internet of Things (IoT) market segments by 2026. [...]

See More

TCG News Releases

TCG Executive Director Stephanie Schultz Wins a 2020 Public Relations and Marketing Excellence Award

Beaverton, OR, USA, October 6, 2020—Today the Business Intelligence Group announced that Stephanie Schultz, Executive Director of Trusted Computing Group (TCG) has today won the Marketing Executive of the Year award at the 2020 Public Relations and Marketing Excellence Awards. TCG is a not-for- [...]

Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things

In this Spotlight Edition of The Security Ledger Podcast, sponsored by Trusted Computing Group (TCG), we’re joined by Intel Fellow Claire Vishik to talk about the evolving concept of online “trust.” Vishik is a TCG Director and spent 14 years as the Director of Trusted Technologies at Inte [...]

TCG propels security for embedded, automotive and IoT systems with complete TPM 2.0 Software Stack

Beaverton, OR, USA, June 23, 2020 - Security for millions of devices across worldwide markets has been enhanced today as the Trusted Computing Group (TCG) releases its latest specification for the latest Trusted Platform Module (TPM 2.0) technology: the Feature Application Programming Interface (FAP [...]

See More

Whitepapers & Guides

See More

Member News Releases

AMI Announces Support for Key Management Service (KMS) Protocol in Aptio V UEFI Firmware

NORCROSS, GEORGIA - AMI®, a global leader in powering, managing and securing the world's connected digital infrastructure through its BIOS, BMC and security solutions, is pleased to announce support for the Key Management Service (KMS) Protocol in its Aptio® V UEFI Firmware. UEFI system firmwar [...]

Intel Highlights Latest Security Investments at RSA 2020

SAN FRANCISCO, Feb. 26, 2020 – At the Intel Security Day event during RSA Conference 2020, Intel underscored its commitment to security with several announcements, including details on security capabilities coming in future products. At Intel, security is a fundamental and foundational element of [...]

American Megatrends supports BIOS passwords to be stored in the TPM NVRAM via new Aptio® V UEFI Firmware eModule

NORCROSS, GEORGIA: - American Megatrends International LLC (AMI), a global leader in BIOS and UEFI firmware, server and remote management tools, data storage products and unique solutions based on the Linux® and Android™ operating systems, is pleased to announce support for BIOS passwords to be s [...]

See More

Images & Graphics

See More