Date Published: July, 18, 2016
You do have a backup procedure for your computer already set up, right? If you don’t, now is the time to execute one. It should be easy. There are plenty of options, too. With ubiquitous cloud solutions and a myriad of online storage options, just a few… READ MOREDate Published: July, 01, 2016
by Jun Takei, Intel Corporation TCGの役割は、世界を繋ぐデジタル情報通信基盤を安全に利用するためのツールを、標準化を通して社会に提供することにある。一方、政府や公共セクターの役割は�… READ MOREDate Published: June, 09, 2016
TCG and members, including WIBU, Infineon and Cisco, will brave the heat July 11-14 to demonstrate and talk to attendees of the IoT Evolution Expo. This event will look at a variety of Internet of Things-related topics, including security. Some fabulous k… READ MOREDate Published: May, 20, 2016
Earlier this year, TCG hosted two dozen terrific demonstrations at the RSA Conference during its seminar sessions. Among those demos was something that is becoming very compelling for many companies: protecting intellectual property from attacks and oth… READ MOREDate Published: May, 05, 2016
By now, security experts, device makers and consumers are becoming aware that connected devices - from cars to baby monitors to wearables - are inherently insecure. The reasons for these vulnerabilities varies, but the result is the same: a stream of lost… READ MOREDate Published: April, 18, 2016
This year already has been a doozy for industrial control systems, or ICS, security incidents. Experts are still puzzling over the Ukranian power grid hack (more here at Wired) and arguing about how to best prevent this type of take-over. Elsewhere, a n… READ MOREDate Published: April, 11, 2016
Self-encrypting Drives Get Certified; Trusted Computing Group to Host First Compliance Workshop May 10-11, 2016 For many enterprise IT buyers, certification is insurance against products that don’t do what they’re supposed to do in a consistent fashi… READ MOREDate Published: April, 11, 2016
As TCG’s Trusted Network Communications (TNC)-enabled technology is deployed in real-world environments, we're learning that deployers have the need to collect robust posture information to support endpoint compliance, security automation, and continuou… READ MOREDate Published: April, 05, 2016
Trusted Computing Group (TCG) really has come a long way from its origins in desktop PCs with the early TPMs. Today, TCG has work groups not only focused on continued security for PCs, servers and network gear, but we also have had for some time an expand… READ MOREDate Published: March, 01, 2016
Recap: RSA Conference 2016 For the 12th year, Trusted Computing Group hosted a session at RSA here in the U.S. What used to be a dead day, Monday, is now packed with association sessions, the Innovation Sandbox and training. Fortunately, more than 1,100 … READ MORE