TCG Blog

How to Protect IP in the Internet of Things: TCG to Host June 7 Webcast with Infineon and WIBU Systems

Date Published: May, 20, 2016

Earlier this year, TCG hosted two dozen terrific demonstrations at the RSA Conference during its seminar sessions.  Among those demos was something that is becoming very compelling for many companies: protecting intellectual property from attacks and oth… READ MORE

We Cannot Trust the IoT; TCG to Speak at May IoT Developers Conference

Date Published: May, 05, 2016

By now, security experts, device makers and consumers are becoming aware that connected devices - from cars to baby monitors to wearables - are inherently insecure. The reasons for these vulnerabilities varies, but the result is the same: a stream of lost… READ MORE

Join Trusted Computing Group Members and SANS ICS Team for Webcast on Insecure Networks May 3

Date Published: April, 18, 2016

This year already has been a doozy for  industrial control systems, or ICS, security incidents. Experts are still puzzling over the Ukranian power grid hack (more here at Wired) and arguing about how to best prevent this type of take-over. Elsewhere, a n… READ MORE

Self-Encrypting Drives Get Certified; Trusted Computing Group to Host First Compliance Workshop May 10-11, 2016

Date Published: April, 11, 2016

Self-encrypting Drives Get Certified; Trusted Computing Group to Host First Compliance Workshop May 10-11, 2016 For many enterprise IT buyers, certification is insurance against products that don’t do what they’re supposed to do in a consistent fashi… READ MORE

TCG Updates IF-M Segmentation to Enable Efficient Information Exchange

Date Published: April, 11, 2016

As TCG’s Trusted Network Communications (TNC)-enabled technology is deployed in real-world environments, we're learning that deployers have the need to collect robust posture information to support endpoint compliance, security automation, and continuou… READ MORE

Trusted Computing Group Joins the Detroit Renaissance with Focus on Security in Cars and IoT

Date Published: April, 05, 2016

Trusted Computing Group (TCG) really has come a long way from its origins in desktop PCs with the early TPMs. Today, TCG has work groups not only focused on continued security for PCs, servers and network gear, but we also have had for some time an expand… READ MORE

Recap: RSA Conference 2016

Date Published: March, 01, 2016

Recap: RSA Conference 2016 For the 12th year, Trusted Computing Group hosted a session at RSA here in the U.S. What used to be a dead day, Monday, is now packed with association sessions, the Innovation Sandbox and training. Fortunately, more than 1,100 … READ MORE

Tags:

TCG RSA Session Feb. 29 Adds Well-Known ICS Expert Speaker; Amazing Give-aways; and Lots of Demos + Some Other Goodies

Date Published: February, 23, 2016

Media sponsors for this year’s event are Embedded Computing Design and the Security Ledger. TCG RSA Session Feb. 29 Adds Well-Known ICS Expert Speaker; Amazing Give-aways; and Lots of Demos + Some Other Goodies Next week’s Monday, Feb. 29 RSA session… READ MORE

Tags:

TCG’s February 29 RSA Conference Session Features Google, Center for Internet Security, Microsoft and More to Talk IoT Security

Date Published: February, 05, 2016

TCG’s February 29 RSA Conference Session Features Google, Center for Internet Security, Microsoft and More to Talk IoT Security If you are planning to attend RSA Conference starting later this month, make sure to check out the Monday, Feb.29 session ho… READ MORE

Tags:

TCG Liaison GlobalPlatform Opens Call for Speakers for 2016 Trusted Execution Environment Conference

Date Published: January, 25, 2016

TCG Liaison GlobalPlatform Opens Call for Speakers for 2016 Trusted Execution Environment Conference TCG works closely with a number of industry groups who are tackling various aspects of security across a range of devices and their underlying infrastruc… READ MORE