Date Published: January, 30, 2017
Trusted Computing Group (TCG) has teamed with Embedded Computing Design to find out more about how developers and designers, as well as providers of various elements of these systems, are thinking about security. We all know that traditional embedded s… READ MOREDate Published: January, 17, 2017
Connectivity from companies to their suppliers and the many others involved in complex manufacturing operations presents a challenging IT security problem - largely because so many elements of this supply chain and its connectivity are beyond the control … READ MOREDate Published: January, 12, 2017
Many TCG members and those in the storage community fondly recall Dr. Michael Willet, who died Dec. 24, 2016 after a short illness. Willett previously represented Seagate and Samsung in TCG and was a tireless, globetrotting evangelist and advocate … READ MOREDate Published: January, 11, 2017
TCG has been working on an important new area for security: network equipment. While much has been made of protecting data on the network, the actual equipment has been somewhat shortchanged on security. This is critical, since it is possible - and perhap… READ MOREDate Published: January, 10, 2017
Visitors to the TCG website, http://www.trustedcomputinggroup.org, still view documents associated with the TPM, or Trusted Module Platform, more frequently than any other topic. In 2016, TCG released its TPM 2.0 Library Specification ( http://www.tru… READ MOREDate Published: December, 01, 2016
Long-time TCG member STMicroelectronics has long implemented the TCG TPM specifications. This week, it announced a new product line. From their site (http://www.st.com/content/st_com/en/about/media-center/press-item.html/p3859.html): “…STMicroelect… READ MOREDate Published: November, 18, 2016
TCG and its members created a non-proprietary way to ensure data on storage devices, such as hard disk drives or solid state (flash) drives. The industry specifications for self-encrypting drives (http://www.trustedcomputinggroup.org/work-groups/storage/)… READ MOREDate Published: October, 13, 2016
Trusted Computing Group’s TPM 2.0 Library Specification, recently adopted as an ISO/IEC 11889:2015 standard (http://www.trustedcomputinggroup.org/tpm-2-0-library-specification-approved-isoiec-international-standard/), is a new way to implement TPM and t… READ MOREDate Published: September, 27, 2016
Even as enterprises make progress on securing traditional IT networks, the OT, or operational technology, side of networks remain surprisingly vulnerable. Why? In the IT world, administrators regularly patch, use more current versions of hardware and soft… READ MOREDate Published: September, 20, 2016
by Jun Takei, Intel Corporation 日本の情報セキュリティに多大なる貢献をされてきた奈良先端科学技術大学院大学の山口英先生が2016年5月9日に急逝されました。 先生のいままでの功績は多くの… READ MORE