TCG Blog

Tell Us About Your Internet of Things (IoT) and Embedded Systems Security Fears, Plans and Ideas

Date Published: January, 30, 2017

Trusted Computing Group (TCG) has teamed with Embedded Computing Design to find out more about how developers and designers, as well as providers of various elements of these systems, are thinking about security. We all know that traditional embedded s… READ MORE

Trusting the Supply Chain

Date Published: January, 17, 2017

Connectivity from companies to their suppliers and the many others involved in complex manufacturing operations presents a challenging IT security problem - largely because so many elements of this supply chain and its connectivity are beyond the control … READ MORE

Remembering Storage and SED Expert Michael Willett

Date Published: January, 12, 2017

Many TCG members and those in the storage community fondly recall Dr. Michael Willet, who died Dec. 24, 2016 after a short illness. Willett previously represented Seagate and Samsung in TCG and was a tireless, globetrotting evangelist and advocate … READ MORE

Network Equipment Security Will Be Critical in 2017

Date Published: January, 11, 2017

TCG has been working on an important new area for security: network equipment. While much has been made of protecting data on the network, the actual equipment has been somewhat shortchanged on security. This is critical, since it is possible - and perhap… READ MORE

Everything You Wanted to Know About the TPM: TCG Webcast January 31, 2017

Date Published: January, 10, 2017

Visitors to the TCG website, http://www.trustedcomputinggroup.org, still view documents associated with the TPM, or Trusted Module Platform, more frequently than any other topic. In 2016, TCG released its TPM 2.0 Library Specification ( http://www.tru… READ MORE

STMicro Releases New Security Modules with TPM 2.0

Date Published: December, 01, 2016

Long-time TCG member STMicroelectronics has long implemented the TCG TPM specifications. This week, it announced a new product line. From their site (http://www.st.com/content/st_com/en/about/media-center/press-item.html/p3859.html): “…STMicroelect… READ MORE

Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs

Date Published: November, 18, 2016

TCG and its members created a non-proprietary way to ensure data on storage devices, such as hard disk drives or solid state (flash) drives. The industry specifications for self-encrypting drives (http://www.trustedcomputinggroup.org/work-groups/storage/)… READ MORE

Resources for Using the Trusted Platform Module 2.0 Library Specification

Date Published: October, 13, 2016

Trusted Computing Group’s TPM 2.0 Library Specification, recently adopted as an ISO/IEC 11889:2015 standard (http://www.trustedcomputinggroup.org/tpm-2-0-library-specification-approved-isoiec-international-standard/), is a new way to implement TPM and t… READ MORE

How to Trust Your Operational Technology (OT) Networks – A Look at Securing Manufacturing

Date Published: September, 27, 2016

Even as enterprises make progress on securing traditional IT networks, the OT, or operational technology, side of networks remain surprisingly vulnerable. Why? In the IT world, administrators regularly patch, use more current versions of hardware and soft… READ MORE

追悼 山口英先生

Date Published: September, 20, 2016

by Jun Takei, Intel Corporation 日本の情報セキュリティに多大なる貢献をされてきた奈良先端科学技術大学院大学の山口英先生が2016年5月9日に急逝されました。 先生のいままでの功績は多くの… READ MORE