Date Published: May, 20, 2016
Earlier this year, TCG hosted two dozen terrific demonstrations at the RSA Conference during its seminar sessions. Among those demos was something that is becoming very compelling for many companies: protecting intellectual property from attacks and oth… READ MOREDate Published: May, 05, 2016
By now, security experts, device makers and consumers are becoming aware that connected devices - from cars to baby monitors to wearables - are inherently insecure. The reasons for these vulnerabilities varies, but the result is the same: a stream of lost… READ MOREDate Published: April, 18, 2016
This year already has been a doozy for industrial control systems, or ICS, security incidents. Experts are still puzzling over the Ukranian power grid hack (more here at Wired) and arguing about how to best prevent this type of take-over. Elsewhere, a n… READ MOREDate Published: April, 11, 2016
Self-encrypting Drives Get Certified; Trusted Computing Group to Host First Compliance Workshop May 10-11, 2016 For many enterprise IT buyers, certification is insurance against products that don’t do what they’re supposed to do in a consistent fashi… READ MOREDate Published: April, 11, 2016
As TCG’s Trusted Network Communications (TNC)-enabled technology is deployed in real-world environments, we're learning that deployers have the need to collect robust posture information to support endpoint compliance, security automation, and continuou… READ MOREDate Published: April, 05, 2016
Trusted Computing Group (TCG) really has come a long way from its origins in desktop PCs with the early TPMs. Today, TCG has work groups not only focused on continued security for PCs, servers and network gear, but we also have had for some time an expand… READ MOREDate Published: March, 01, 2016
Recap: RSA Conference 2016 For the 12th year, Trusted Computing Group hosted a session at RSA here in the U.S. What used to be a dead day, Monday, is now packed with association sessions, the Innovation Sandbox and training. Fortunately, more than 1,100 … READ MOREDate Published: February, 23, 2016
Media sponsors for this year’s event are Embedded Computing Design and the Security Ledger. TCG RSA Session Feb. 29 Adds Well-Known ICS Expert Speaker; Amazing Give-aways; and Lots of Demos + Some Other Goodies Next week’s Monday, Feb. 29 RSA session… READ MOREDate Published: February, 05, 2016
TCG’s February 29 RSA Conference Session Features Google, Center for Internet Security, Microsoft and More to Talk IoT Security If you are planning to attend RSA Conference starting later this month, make sure to check out the Monday, Feb.29 session ho… READ MOREDate Published: January, 25, 2016
TCG Liaison GlobalPlatform Opens Call for Speakers for 2016 Trusted Execution Environment Conference TCG works closely with a number of industry groups who are tackling various aspects of security across a range of devices and their underlying infrastruc… READ MORE