Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

The Internet of Things is broken. We need better security to fix it

A hot topic in both business and technology circles, the Internet of Things defines a range of technologies that allow us to potentially connect anything electronic with each other in a network of machines, appliance, devices and sensors. [...]

Firmware compromise a major attack vector

Cyber-criminals have been very resourceful in gaining a foothold in enterprise networks. They have added firmware attacks on computing and network connected devices to their compromise tools, including highly socially engineered spear-phishing, infected USBs, compromised credentials, BYOD incursions [...]

Google’s All New Smart WiFi Router OnHub: Yay or Nay?

Google just announced its second wireless router for the home as part of its big hardware event - the Google smart WiFi Router called OnHub. What are its upside and downside? [...]

See More

TCG News Releases

Learn How to Use the Trusted Platform Module (TPM) for Security in Webcast January 31

PORTLAND, ORE. Jan. 23, 2016 -- Trusted Computing Group (TCG) and experts from GE and Security Innovation will talk about the features, benefits, and application of the Trusted Platform Module (TPM) for enterprise, embedded systems and Internet of Things security in a January 31, 2017, webcast. [...]

Trusted Computing Group to Discuss and Demonstrate Security of the Internet of Things at ESC Silicon Valley 2016

PORTLAND, Ore., Dec. 2, 2016 – Trusted Computing Group and its members will demonstrate securing the Internet of Things with foundational trust at the Dec. 6-8, 2016 Embedded Systems Conference (ESC) Silicon Valley, San Jose, Calif. In Booth 1820, Mocana will show implementation of TPM security [...]

Save the Data: Trusted Computing Group to Host Data Protection Webcast November 16

PORTLAND, ORE. Nov. 3, 2016 -- Trusted Computing Group (TCG) and member Michael Willett, Drive Trust Alliance, will address how to protect data, no matter where it lives, in a 60-minute webcast November 16.             Data has exploded across devices and things. No matter where it liv [...]

See More

Whitepapers & Guides

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at [...]

TCG ICS Specification for Network Segmentation

Download PDF (0.31 MB) [...]

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previou [...]

See More

Member News Releases

CES 2017: Infineon secures systems from wearables to automotive

As it has been for much of the last year, security was well addressed at CES 2017 in everything from consumer wearables to sophisticated automotive designs. Early in the show I got to see both ends of the security spectrum when visiting the Infineon booth, where Josef Kohn, Marketing and Program Man [...]

STMicroelectronics Boosts Trusted Computing with New Advanced Security Modules

   Expansion of STSAFE family with latest Trusted Platform Modules (TPMs) extends support for state-of-the-art hardware-based online security Largest on-chip memory in the market provides greater storage for sensitive data Devices are certified to highest security-industry standards [...]

Security Innovation Engineer Receives Prestigious TCG Key Contributor Award

FOR IMMEDIATE RELEASE Rebecca Leitch Marketing Communications Manager Security Innovation 978-267-1631 [...]

See More

Images & Graphics

Where Trust Begins

View this infographic on protecting the connected ecosystem. [...]

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0. [...]

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.