TCG Blog

TCG Releases Trust Assessment Framework

Date Published: June, 18, 2017

In today’s enterprise, cloud computing allows enterprises to acquire or maintain computer services without building the infrastructure themselves. Cloud services often are combined with in-house infrastructure in a model that’s known as the hybrid clo… READ MORE

「21回日本医療情報学会春季学術大会 シンポジウム 2017」のリコーブースにてTPM 搭載デジタル複合機を展示

Date Published: June, 01, 2017

by Yoshikazu Azuma, JRF Member, Ricoh Company Ltd. Trusted Computing Groupメンバーの株式会社リコーは、6月1日から3日まで 福井市 フェニックス・プラザで開催中の「第21回日本医療情報学会春季学術大会 … READ MORE

2017 International Cryptographic Module Conference and FDE cPPs

Date Published: May, 31, 2017

From May 17th to 19th, I had the pleasure of attending the Fifth International Cryptographic Module Conference (ICMC 2017 http://icmconference.org/ ) with my colleague, Alexander Mazuruc.   Alex usually attends this conference (https://www.winmagic.com/… READ MORE

Trusted Secure Networks Front and Center at Interop ITX Event May 2017

Date Published: May, 25, 2017

This year’s Interop ITX event provided attendees with a new variety of products, presentations and technical talks. The Internet of Things and its connectivity, along with security, contained in the spotlight as vendors attempted to pitch their many sol… READ MORE

Content Creators Need Assurance Their Data is Safe and Available, Say Experts with the Creative Storage Conference

Date Published: May, 16, 2017

On May 24, 2017, experts in data storage and content creation will converge in the land of movie-making, Los Angeles, to tackle the topic of how to store and secure all that valuable IP. Recent hacks, such as that of the NetFix series “Orange is the New… READ MORE

@Interop ITX to Showcase TCG IoT and Network Security Solutions May 16-18

Date Published: May, 12, 2017

TCG members CoSoSys, Mocana, OnBoard Security and Tempered Networks will show a variety of solutions in booth #234 in the Interop Business Hall on Tuesday, May 16 through Thursday, May 18, 2017. Demos will include implementation of the Trusted Software… READ MORE

How Embedded and IoT Designers and Developers Think About Security – A Look at Survey Data and the Way Forward

Date Published: May, 11, 2017

IoT devices now outnumber humans (http://www.nextgov.com/technology-news/tech-insider/2017/04/hackers-pov-internet-things-security/137292/). Security practices have not followed suit, however, with well-publicized attacks and hacks as varied as a damaging… READ MORE

TCG Members to Show IoT and Network Security Solutions at Interop ITX May 16-18, 2017

Date Published: April, 10, 2017

TCG and members will return to Interop May 16-18, 2017 (@Interop) in Las Vegas to demonstrate and talk about new ways to secure the IoT and networks. Interop ITX has expanded its focus to include the increasingly connected world of things and associated s… READ MORE

Tags: ,

Join Webcast to Learn How Embedded and IoT Designers View Security, Hosted by TCG with Embedded Computing Design

Date Published: April, 10, 2017

TCG will host a webcast Monday, April 24, 10 a.m. Pacific/1 p.m. Eastern, to talk about how embedded systems and IoT designers, developers and others in the ecosystem think about security. TCG recently sponsored a survey with Embedded Computing Design to … READ MORE

How Do Embedded and IoT Designers Think About Security? TCG and Embedded Computing Design Look at the Survey Data

Date Published: March, 20, 2017

Earlier this year, Embedded Computing Design with TCG conducted a survey of more than 250 embedded and IoT developers and designers to learn more about how they view, plan and implement security. Not surprisingly, many are concerned about security and s… READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.