Date Published: June, 10, 2015
The most recent high-profile data breach, of government workers' personal information, has frustrated some cybersecurity experts. Many experts had previously pointed out a number of security issues to the agency that was breached. This breach joins many o… READ MOREDate Published: June, 08, 2015
For the last few years, Ponemon Institute has studied the impact of data breaches. This year, the report, available for download here from IBM (http://www-03.ibm.com/security/data-breach/) notes some disturbing trends. The per-record cost of a data breac… READ MOREDate Published: June, 04, 2015
The availability of connected devices and associated content is leading to an almost dizzying array of applications. Last week, we saw an ad for a connected toothbrush complete with tracking app. And while having all that data can be very useful and exiti… READ MOREDate Published: June, 01, 2015
Even as the number of events and coverage of the Internet of Things, or IOT, continues to accelerate, security has become hot. Last week, EE Times noted a number of efforts around how to secure an increasingly large and complex piece of our infrastructure… READ MOREDate Published: May, 19, 2015
TCG日本支部 議長 長谷川啓子 2015年5月19日 TCG日本支部では、インテル東京オフィスのショールームにTCG技術をご紹介するデモを展示し、お… READ MOREDate Published: May, 19, 2015
TCG日本支部では、インテル東京オフィスのショールームにTCG技術をご紹介するデモを展示し、お客様への技術の普及促進を目指して参りました。このたび、こちらのデモの内容を5年ぶりに�… READ MOREDate Published: May, 01, 2015
A new report from Coughlin Associates indicates that a significant number of hard disk drives and solid state drives support self-encrypting drive, or SED, capabilities, which are based on standards created by TCG. The report looks at the growth of SED-c… READ MOREDate Published: April, 28, 2015
Next week, developers from a range of companies will convene at the Internet of Things Developers Conference in Santa Clara, chaired by long-time embedded systems expert Markus Levy. According to organizers, “...Some will argue that the Internet of Thi… READ MOREDate Published: April, 20, 2015
How can we secure the Internet of Things (IoT)? This topic has stirred considerable debate recently, with Bruce Schneier and other important figures proclaiming that IoT is “indefensible” or worse. Today, TCG is releasing a document titled “TCG Gui… READ MOREDate Published: April, 17, 2015
Perhaps TCG is a bit like the tortoise in the infamous fable involving a hare. But the sheer number and breadth of the TCG member demonstrations this year at the RSA Conference 2015 is a tangible result of years of R&D, product development, and contin… READ MORE