TCG Blog

Save the Data: Self-Encrypting Drives

Date Published: July, 18, 2016

You do have a backup procedure for your computer already set up, right? If you don’t, now is the time to execute one. It should be easy. There are plenty of options, too. With ubiquitous cloud solutions and a myriad of online storage options, just a few… READ MORE

サイバーセキュリティ対策、本当に大事なことは何か?

Date Published: July, 01, 2016

by Jun Takei, Intel Corporation TCGの役割は、世界を繋ぐデジタル情報通信基盤を安全に利用するためのツールを、標準化を通して社会に提供することにある。一方、政府や公共セクターの役割は�… READ MORE

Hot, Hot, Hot: IoT, Security and Vegas July 11-14 at the IoT Evolution Expo

Date Published: June, 09, 2016

TCG and members, including WIBU, Infineon and Cisco, will brave the heat July 11-14 to demonstrate and talk to attendees of the IoT Evolution Expo. This event will look at a variety of Internet of Things-related topics, including security. Some fabulous k… READ MORE

How to Protect IP in the Internet of Things: TCG to Host June 7 Webcast with Infineon and WIBU Systems

Date Published: May, 20, 2016

Earlier this year, TCG hosted two dozen terrific demonstrations at the RSA Conference during its seminar sessions.  Among those demos was something that is becoming very compelling for many companies: protecting intellectual property from attacks and oth… READ MORE

We Cannot Trust the IoT; TCG to Speak at May IoT Developers Conference

Date Published: May, 05, 2016

By now, security experts, device makers and consumers are becoming aware that connected devices - from cars to baby monitors to wearables - are inherently insecure. The reasons for these vulnerabilities varies, but the result is the same: a stream of lost… READ MORE

Join Trusted Computing Group Members and SANS ICS Team for Webcast on Insecure Networks May 3

Date Published: April, 18, 2016

This year already has been a doozy for  industrial control systems, or ICS, security incidents. Experts are still puzzling over the Ukranian power grid hack (more here at Wired) and arguing about how to best prevent this type of take-over. Elsewhere, a n… READ MORE

Self-Encrypting Drives Get Certified; Trusted Computing Group to Host First Compliance Workshop May 10-11, 2016

Date Published: April, 11, 2016

Self-encrypting Drives Get Certified; Trusted Computing Group to Host First Compliance Workshop May 10-11, 2016 For many enterprise IT buyers, certification is insurance against products that don’t do what they’re supposed to do in a consistent fashi… READ MORE

TCG Updates IF-M Segmentation to Enable Efficient Information Exchange

Date Published: April, 11, 2016

As TCG’s Trusted Network Communications (TNC)-enabled technology is deployed in real-world environments, we're learning that deployers have the need to collect robust posture information to support endpoint compliance, security automation, and continuou… READ MORE

Trusted Computing Group Joins the Detroit Renaissance with Focus on Security in Cars and IoT

Date Published: April, 05, 2016

Trusted Computing Group (TCG) really has come a long way from its origins in desktop PCs with the early TPMs. Today, TCG has work groups not only focused on continued security for PCs, servers and network gear, but we also have had for some time an expand… READ MORE

Recap: RSA Conference 2016

Date Published: March, 01, 2016

Recap: RSA Conference 2016 For the 12th year, Trusted Computing Group hosted a session at RSA here in the U.S. What used to be a dead day, Monday, is now packed with association sessions, the Innovation Sandbox and training. Fortunately, more than 1,100 … READ MORE

Tags: