TCG Blog

TCG and Members Offer New Ways to Secure Supply Chain

Date Published: October, 04, 2018

A recent Deloitte Touche Tohmatsu Limited survey* found that 85 percent of surveyed global supply chains had experienced at least one disruption in the past 12 months. These disruptions can disrupt business, result in production delays, incur significan… READ MORE

TCG Members Mocana and Wibu-Systems to Demonstrate IoT Security at IoT Solutions World Congress

Date Published: October, 01, 2018

TCG continues to expand and evolve its core concepts of the root of trust and the protection of data, devices and networks into the IoT and embedded systems. In recent years, a number of TCG members have developed innovative solutions to many security cha… READ MORE

ATIS and TCG to Collaborate to Help Improve Cybersecurity

Date Published: September, 19, 2018

The Alliance for Telecommunications Industry Solutions (ATIS) (http://ATIS.org) and TCG (https://trustedcomputinggroup.org) have entered into a Memorandum of Understanding (MoU) to advance information and communications technology (ICT) cybersecurity. … READ MORE

EE Journal Takes a Look at Securing IOT Devices with TCG’s DICE Root of Trust

Date Published: September, 05, 2018

TCG and members Microsoft, Microchip, Winbond and others have helped create DICE , or the Device Identity Composition Engine, that enables a lightweight root of trust for IOT and embedded devices. These companies and others are implementing DICE in a numb… READ MORE

Public Review Requested: TCG SNMP MIB for TPM-Based Attestation

Date Published: August, 29, 2018

Attestation, the ability to monitor the authenticity of software versions and configurations running a device, allows owners and auditors to detect deviation from approved software and firmware and potentially identifying misconfigured or infected devices… READ MORE

OnBoard Security Publishes New Guidance for Secure Software and Use of TPM with TSS

Date Published: August, 06, 2018

TCG member OnBoard Security, which offers a Trusted Software Stack (TSS) for the TPM 2.0, has just published a useful paper on how to evaluate software security and how to develop and maintain more secure software. The paper also includes some case studie… READ MORE

TCG Publishes New Whitepaper to Guide Use of Its Mobile and Trusted Network Communications (TNC) Specifications for Mobile Security

Date Published: July, 30, 2018

The Trusted Computing Group has released a new whitepaper describing how the combination of technologies developed in its mobile and Trusted Network Communications (TNC) workgroups can be combined to address challenges faced by mobile device, mobile netwo… READ MORE

TCG Talks to SecurityLedger.com about DICE in New Podcast

Date Published: July, 26, 2018

The growing number of embedded and Internet of Things devices means more attack surfaces and opportunities for mayhem. Many devices were developed with little or no security considerations, and traditional security approaches, including the TCG’s Truste… READ MORE

Mocana Leverages TPM 2.0 for Secure Embedded and IOT Devices

Date Published: July, 25, 2018

On July 24, eWeek published a story about new support for TPM 2.0  from TCG member Mocana, http://www.eweek.com/security/mocana-embraces-tpm-2.0-for-iot-device-authentication-assurance. eWeek security journalist Sean Kerner (@SeanKerner) notes, “...… READ MORE

New TCG Architect’s Guide Demonstrates Fraud Reduction in Payment Industry with Trusted Computing

Date Published: July, 12, 2018

TCG and its work groups recently have spent much time examining the growing insecurity of payments via mobile/IoT devices and how core concepts of trusted computing can be applied to reduce fraud and better protect payments, which are quickly becoming a n… READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.