Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Why Companies Are Forming Cybersecurity Alliances

In the physical world, governments are responsible for keeping citizens and corporations safe from enemies. The digital world, so far, has been a little different. When it comes to cybersecurity and cyber attacks, most governments have spent much more time increasing their offensive capabilities tha [...]

Editor’s Question: How important is cybersecurity education for young people for closing the cyberskills gap?

The majority of UK parents are in the dark when it comes to advising their children on a career in cybersecurity, research from global cybersecurity training provider, SANS Institute, shows. [...]

Chip Security Emerges a Hot Topic in the Supply Chain

For electronics OEMs, ensuring that the semiconductor chips that they source and use are secure and safe is becoming increasingly important as the sophistication of both the systems and of cybercriminals increase. It’s important to think about security as early in the design process possible. [...]

See More

TCG News Releases

A one-size-fits-all approach will not be enough to secure the IoT, says TCG

Steve Hanna, Co-chair of TCG’s Embedded Systems Work Group San Jose, California, June 26, 2019 – Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach – and every kind of connected object must be assessed individually, the Co-chair of Tru [...]

TCG launches initiative to develop “world’s tiniest TPM”

  Warsaw, Poland, June 13, 2019 – Groundbreaking work to assure cybersecurity in the Internet of Things (IoT) era has been initiated, as the Trusted Computing Group (TCG) launched a new project to create the “world’s tiniest Trusted Platform Module (TPM).” Many manufacturers w [...]

Spotlight Podcast: Fixing Supply Chain Hacks with Strong Device Identities

Supply chain hacks like ME Docs and ASUS aren’t inevitable. In this Spotlight Podcast, sponsored by Trusted Computing Group, I speak with Dennis Mattoon, a Principal Researcher at Microsoft Research and the Chairman of the Trusted Computing Group’s DICE Architectures Working Group* about how str [...]

See More

Whitepapers & Guides

See More

Member News Releases

American Megatrends supports BIOS passwords to be stored in the TPM NVRAM via new Aptio® V UEFI Firmware eModule

NORCROSS, GEORGIA: - American Megatrends International LLC (AMI), a global leader in BIOS and UEFI firmware, server and remote management tools, data storage products and unique solutions based on the Linux® and Android™ operating systems, is pleased to announce support for BIOS passwords to be s [...]

Protecting communication within the smart factory and to the cloud: Infineon presents the world’s first TPM 2.0 for Industry 4.0

Munich, Germany – 27 March 2019 – Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) presents the world’s first Trusted Platform Module (TPM) specifically for industrial applications at this year’s Hannover Messe (Hannover, Germany, 1-5 April 2019). The OPTIGA™ TPM SLM 9670 protects the in [...]

AMI Presents on TPM Usage at UEFI Plugfest

HPBird Chen presents at AMI's UEFI plugfest on TPM usage in presentation titled 'Advanced Trusted Platform Module (TPM) Usage'. Download the full presentation here: https://www.uefi.org/sites/default/files/resources/UEFI_Plugfest_Advanced_TPM_Usage_Fall_2018.pdf See a full list of all presenta [...]

See More

Images & Graphics

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.