TCG Blog

TCG Comments on NHTSA’s Automotive Electronic Control Systems Safety and Security

Date Published: February, 06, 2015

The U.S. National Highway Transportation Safety Administration, or NHTSA, recently published a notice requesting comments on the topic of automotive security (http://www.regulations.gov/#!documentDetail;D=NHTSA-2014-0108-0001). TCG has been working for s… READ MORE

Tags:

Apress and TCG Members Announce Availability of “A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

Date Published: February, 05, 2015

For years, developers, IT and security professionals have tried to get their minds around the TPM. Most agree the secure, hardware root of trust is a good approach for ensuring data and devices are protected. And TPMs now of course are shipped in systems … READ MORE

Tags:

Trusted Computing Experts Head to India for M2M/IoT Conference February 2015

Date Published: February, 03, 2015

On 19-20 February 2015, in New Delhi, India, TCG will join other companies and industry experts as they look at some of the hottest topics in IT: machine to machine security and the Internet of Things. The India M2M Forum, www.indiam2mforum.com, will loo… READ MORE

Tags:

Trusted Execution Environment, TPM Provide Strong Mobile Security Foundation, Say Experts

Date Published: January, 22, 2015

For some years, Trusted Computing Group (TCG) has been working with GlobalPlatform to help develop mobile security standards and solutions. Recently, Trustonic’s Jon Geater, who works with both organizations, spoke on the relationship between TPM and Tr… READ MORE

Tags:

TCG Member Calls on President to Improve Cybersecurity with TPM and More

Date Published: January, 21, 2015

We all know that security is getting worse, not better. And the growing Internet of Things is not making security any easier to manage. Some in the U.S.  have called for a concerted government-backed effort to improve security. A great editorial from Wa… READ MORE

Tags:

Save the Date: RSA Conference 2015 to Host TCG Session with Look at IoT and Other Critical Security Issues

Date Published: January, 13, 2015

With the holidays in the rear view mirror, those of us in the security community are looking ahead to RSA Conference 2015 April 20-24. TCG will once again give attendees a great reason to wake up early Monday and head to Moscone West before the floor ope… READ MORE

Tags:

TCG Publishes MAP Content Authorization Specification, Leveraging XACML to Protect Data

Date Published: January, 01, 2015

Earlier this year, TCG published for public review a new spec that helps protect potentially high-value data in MAP servers, based on TCG’s IF-MAP protocol - click here for details. Based on the feedback received from the public review and prototype imp… READ MORE

How to Start Deploying Self-encrypting Drives? Simple Crypto-erase for Drive Retirement Is a Good First Step

Date Published: January, 01, 2015

Now that self-encrypting drives are becoming increasingly available and in some cases are the ONLY drive option for enterprise PCs, servers, and storage systems, where can IT and security professionals start and get immediate value with these powerful too… READ MORE

Security is the New Black – A Look at Growing Support for Trusted Company

Date Published: January, 01, 2015

A recent article in Federal Technology Insider provided some interesting outtakes on the use of Trusted Computing by US federal agencies and related bodies.  The article notes the recent publication of NIST documents 800-147, 800-155 and 800-164, all of … READ MORE

Trust in the Cloud

Date Published: January, 01, 2015

In September, TCG hosted a half-day at the TSCP Cyber Collaboration Workshop (more info and presentations at TCG 2016 Events). Among the topics covered: trust in the cloud, and how standards enable the trusted cloud. Michael Donovan, TCG’s co-chair for… READ MORE