Date Published: February, 06, 2015
The U.S. National Highway Transportation Safety Administration, or NHTSA, recently published a notice requesting comments on the topic of automotive security (http://www.regulations.gov/#!documentDetail;D=NHTSA-2014-0108-0001). TCG has been working for s… READ MOREDate Published: February, 05, 2015
For years, developers, IT and security professionals have tried to get their minds around the TPM. Most agree the secure, hardware root of trust is a good approach for ensuring data and devices are protected. And TPMs now of course are shipped in systems … READ MOREDate Published: February, 03, 2015
On 19-20 February 2015, in New Delhi, India, TCG will join other companies and industry experts as they look at some of the hottest topics in IT: machine to machine security and the Internet of Things. The India M2M Forum, www.indiam2mforum.com, will loo… READ MOREDate Published: January, 22, 2015
For some years, Trusted Computing Group (TCG) has been working with GlobalPlatform to help develop mobile security standards and solutions. Recently, Trustonic’s Jon Geater, who works with both organizations, spoke on the relationship between TPM and Tr… READ MOREDate Published: January, 21, 2015
We all know that security is getting worse, not better. And the growing Internet of Things is not making security any easier to manage. Some in the U.S. have called for a concerted government-backed effort to improve security. A great editorial from Wa… READ MOREDate Published: January, 13, 2015
With the holidays in the rear view mirror, those of us in the security community are looking ahead to RSA Conference 2015 April 20-24. TCG will once again give attendees a great reason to wake up early Monday and head to Moscone West before the floor ope… READ MOREDate Published: January, 01, 2015
Earlier this year, TCG published for public review a new spec that helps protect potentially high-value data in MAP servers, based on TCG’s IF-MAP protocol - click here for details. Based on the feedback received from the public review and prototype imp… READ MOREDate Published: January, 01, 2015
Now that self-encrypting drives are becoming increasingly available and in some cases are the ONLY drive option for enterprise PCs, servers, and storage systems, where can IT and security professionals start and get immediate value with these powerful too… READ MOREDate Published: January, 01, 2015
A recent article in Federal Technology Insider provided some interesting outtakes on the use of Trusted Computing by US federal agencies and related bodies. The article notes the recent publication of NIST documents 800-147, 800-155 and 800-164, all of … READ MOREDate Published: January, 01, 2015
In September, TCG hosted a half-day at the TSCP Cyber Collaboration Workshop (more info and presentations at TCG 2016 Events). Among the topics covered: trust in the cloud, and how standards enable the trusted cloud. Michael Donovan, TCG’s co-chair for… READ MORE