TCG Blog

Top-Down and Bottom-Up Defenses to Secure IoT

Date Published: May, 24, 2018

*This blog was originally published by Onboard Security, a TCG member. Many IoT device manufacturers understand the need for cyber security but aren’t sure where to begin.  To add to the confusion, some security vendors will claim their firewall or … READ MORE

Trusted Computing Primary Use Cases

Date Published: May, 17, 2018

*This blog was originally published by Onboard Security, a TCG member. There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by the Trusted Computing Group.  Thi… READ MORE

TPM Enables Secure Over-the-air Software Updates for Vehicles: It’s Here

Date Published: February, 26, 2018

Auto makers have long struggled with the recall issue. A significant portion of recalls are associated now with software updates to our rolling computers, aka cars. These increasingly complex systems of course require the same patches and updates any comp… READ MORE

TCG Releases Guidance and How-to Guide to Secure Vulnerable Network Equipment; Members to Demonstrate at Mobile World Congress and to Host Webinar

Date Published: February, 14, 2018

In the last year or so, TCG members active in developing and supporting network equipment, such as switches, routers and firewalls, have been actively working to develop specific guidance and how-to for protecting these devices against attacks. Why wor… READ MORE

DICE Provides Trust Foundation and Security to IOT and Embedded Devices

Date Published: January, 25, 2018

A new post in Embedded Computing Design by Microsoft’s Dennis Mattoon, also the chair of TCG’s DICE Work Group, explains how the Device Identifier Composition Engine, or DICE, is used to provide a hardware-based root of trust for IoT and embedded syst… READ MORE

Learn to Use New Trusted Computing Software Stack in Webcast Feb. 15, 2018

Date Published: January, 05, 2018

On Feb. 15, 10:00 a.m. Pacific/1:00 p.m., TCG will host a webcast on using the new TCG software stack for securing devices and data. Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs… READ MORE

Industrial IoT Gets New Security Option with Avnet TPM Module

Date Published: December, 13, 2017

Technology distributor Avnet has announced a new security peripheral module based on the TPM 2.0. This module is targeted to Industrial IoT applications, such as factory automation, smart grid and healthcare and will provide a hardware root of trust for p… READ MORE

Steve Hanna of TCG and Infineon to Talk IoT Security at January IoT Evolution Expo, Orlando

Date Published: November, 30, 2017

Steve Hanna, Infineon and co-chair or chair of TCG’s embedded systems, IoT and Industrial Work Groups, will speak at the IoT Evolution Expo (http://www.iotevolutionexpo.com/east/) on Wednesday, January 24, 2018, at 3:00 p.m. – 3:55 p.m. ET in a sessi… READ MORE

TNC Architecture Gets Updates

Date Published: November, 21, 2017

The Trusted Computing Group has released a new version of its Trusted Network Communications (TNC) Architecture specification. TNC enables intelligent policy decisions, dynamic security enforcement, and communication between security systems. These capabi… READ MORE

TPM 2.0: A Short History and How to Use

Date Published: October, 31, 2017

TCG members continue working to create devices and applications to use the TPM 2.0, which offers many benefits for security. The 2.0 approach gives developers and designers many options to use key attributes and to apply them for protecting keys and certi… READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.