Date Published: June, 01, 2023
The EU Commission and High Representative recently announced the ‘European Space Strategy for Security and Defence’ for the first time. Within this strategy, the Commission outlined plans to provide a framework for safety, security, and sustainability… READ MOREDate Published: May, 11, 2023
By Dennis Mattoon, Co-Chair of the DICE Work Group In most large devices, a hardware Root-of-Trust (RoT), such as the Trusted Platform Module (TPM), is used to help defend against firmware attacks. Over a billion devices currently have a TPM inside of… READ MOREDate Published: April, 20, 2023
By Dennis Mattoon, Co-Chair of the Data Center Work Group Owing to the value of information and applications stored in them, data centers remain key targets for cybercriminals. A series of cyberattacks carried out between September 2021 and January 202… READ MOREDate Published: March, 16, 2023
Introduction The rise of fully autonomous vehicles may soon render car ownership obsolete, as ride-sharing companies like Uber embrace the concept of driverless cars. To survive, automotive manufacturers must develop business models that allow feature … READ MOREDate Published: February, 21, 2023
With 20 billion connected devices expected to be in use by 2030, the increasingly digitised world requires more advanced technological innovations to combat the proliferation of cyber-attacks. With more Internet of Things (IoT) devices, there comes an add… READ MOREDate Published: February, 07, 2023
Society has become increasingly connected through Internet-of-Things (IoT) devices, and with the ever-growing movement towards remote working, cyber resilience has never been more crucial. Personal computers often have less hardware and parts compared to … READ MOREDate Published: January, 17, 2023
By Tom Laffey, Co-chair of the Network Equipment workgroup and Co-chair of the Infrastructure workgroup at Trusted Computing Group As the number of connected devices continues to grow, so does the number of network connections to devices. Security at t… READ MOREDate Published: August, 15, 2022
Whether private cloud or public cloud, organizations are increasingly utilizing virtualization, to optimize performance through efficient load distribution and making the best use of their hardware. Failure to secure these systems can lead to significant … READ MOREDate Published: May, 29, 2022
With the Internet of Things (IoT) nearing 27.1 billion devices this year according to Cisco, a series of unprecedented cyber security risks are developing as the global rollout of gigabit broadband and 5G mobile networks continues. At a time when business… READ MOREDate Published: March, 24, 2022
By Steve Hanna, Co-chair of TCG’s Industrial Work Group and IoT Work Group Many sectors now utilize Internet of Things (IoT) equipment to drive digital transformation, and ultimately increase automation and efficiency. In particular, the energy secto… READ MORE