TCG Blog

Wired.com Takes on the Unsecured Car and TCG’s Take on Auto Security

Date Published: July, 27, 2015

Wired.com recently published a frightening account of how a typical automobile can be hacked and controlled (more here at http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/). In the test, a reporter in a late model Jeep experienced a series … READ MORE

Tags:

Trusted Computing, TPM Can Prevent Ocean’s Eleven-Style Security Attacks, As Shown in Demo at This Week’s Embedded Systems Conference Silicon Valley by TCG in Action

Date Published: July, 23, 2015

While crashed trains or planes, power plant meltdowns or chemical spills can - and have - occurred as a result of poor security in the Internet of Things, financial gains represent a huge target for attackers and thieves - whether individuals, organized c… READ MORE

Tags:

Securing the IoT Big Focus of This Year’s Embedded Systems Conference Silicon Valley

Date Published: July, 21, 2015

Here in Santa Clara at Embedded Systems Conference Silicon Valley (#ESCSV), the halls are filled with embedded systems designers trying to learn the latest in design, development, tools and technologies. For us here at Trusted Computing Group, it is grati… READ MORE

Tags:

Forward into the Future – TNC Yesterday, Today, and Tomorrow

Date Published: July, 20, 2015

TCG’s Trusted Network Connect, or TNC, is constantly evolving. Our scope addresses more solutions and more technologies than it did when we began our work a decade ago - and yet our goals are, fundamentally, the same objectives that we've had all along… READ MORE

Tags:

TCG Member Microsoft Comments on Recent ISO/IEC Approval for TPM 2.0 Library Specification

Date Published: July, 09, 2015

TCG members have been commenting to the recent news of international standards body approval for the TPM 2.0 Library Specification. The following post from Microsoft appears at http://blogs.microsoft.com/cybertrust/2015/06/29/governments-recognize-the-imp… READ MORE

自分を守る大切さ

Date Published: June, 19, 2015

先日またもや大量の個人情報に関わる情報の漏洩が政府に近い組織で起こり社会の問題となっています。いわゆる匿名掲示板にその漏洩が公式にその組織から公表される前に内部からその事… READ MORE

Embedded Systems in the Year 2015

Date Published: June, 15, 2015

Let’s face it - for a long time, embedded systems were not that cool. A big business, but it did not have the glamour associated with PCs and then mobile devices. With the Internet of Things, suddenly things have changed. Everyone is talking about sens… READ MORE

Tags:

Cyber Security Needs a Fortress, Not a Sandcastle: A View from the Trenches

Date Published: June, 10, 2015

The most recent high-profile data breach, of government workers' personal information, has frustrated some cybersecurity experts. Many experts had previously pointed out a number of security issues to the agency that was breached. This breach joins many o… READ MORE

Tags:

Ponemon Releases Updated Data Breach Numbers; Costs Keep Going Up

Date Published: June, 08, 2015

For the last few years, Ponemon Institute has studied the impact of data breaches. This year, the report, available for download here from IBM (http://www-03.ibm.com/security/data-breach/) notes some disturbing trends. The per-record cost of a data breac… READ MORE

Tags:

TCG to Speak and Sponsor Embedded TechCon and Discuss a Trusted Door Demo

Date Published: June, 04, 2015

The availability of connected devices and associated content is leading to an almost dizzying array of applications. Last week, we saw an ad for a connected toothbrush complete with tracking app. And while having all that data can be very useful and exiti… READ MORE

Tags: