TCG Blog

How to Start Deploying Self-encrypting Drives? Simple Crypto-erase for Drive Retirement Is a Good First Step

Date Published: January, 01, 2015

Now that self-encrypting drives are becoming increasingly available and in some cases are the ONLY drive option for enterprise PCs, servers, and storage systems, where can IT and security professionals start and get immediate value with these powerful too… READ MORE

Security is the New Black – A Look at Growing Support for Trusted Company

Date Published: January, 01, 2015

A recent article in Federal Technology Insider provided some interesting outtakes on the use of Trusted Computing by US federal agencies and related bodies.  The article notes the recent publication of NIST documents 800-147, 800-155 and 800-164, all of … READ MORE

Trust in the Cloud

Date Published: January, 01, 2015

In September, TCG hosted a half-day at the TSCP Cyber Collaboration Workshop (more info and presentations at TCG 2016 Events). Among the topics covered: trust in the cloud, and how standards enable the trusted cloud. Michael Donovan, TCG’s co-chair for… READ MORE

Open Security Training Tackles Trusted Computing and TPM

Date Published: January, 01, 2015

While we've most certainly dented an old-growth forest trying to explain the many details of the TPM and Trusted Computing in general, a picture (or a good slide) can be worth a thousand words. The highly competent Open Security Training group, following… READ MORE

From RSA Conference: Demonstrating the Feasibility of High Security TPM Provisioning Processes in the Enterprise

Date Published: January, 01, 2015

Muddled and confused about how to start using the TPM? At TCG's recent RSA session, member MITRE explained the process for strong enterprise security requirements. From MITRE's demo: Before TPMs can be used in an enterprise for machine identification, re… READ MORE

Automated Security for Remote Systems

Date Published: January, 01, 2015

The increasing use of mobile devices or the integration of remote embedded systems introduces new threats to enterprise IT networks. While most security programs such as desktop firewalls, antivirus and hard drive encryption work pretty well for laptops, … READ MORE

Trusted Computing in Nokia Lumia

Date Published: January, 01, 2015

At last month's RSA Conference, mobile security was, to nobody's surprise, a big topic. During the TCG session, long-time TCG member Nokia showed its Nokia Lumia 920 mobile device which incorporates Trusted Computing technology (Windows Phone 8 secure boo… READ MORE

What Can You do With the Trusted Platform Module (TPM)?

Date Published: January, 01, 2015

Much has been made about what exactly can be accomplished with the Trusted Platform Module, or TPM. Now that Windows 8 is available, that question becomes easy: lots can be done with the TPM to ensure better system, data and network security. One key use… READ MORE

Trusted Computing Group Makes Use of Trusted Platform Module Easier

Date Published: January, 01, 2015

While billions of TPMs have been embedded into all kinds of computing devices - from PCs to gaming machines - provisioning the TPM for real-world use historically posed some challenges. TCG has been working in recent years to change this. Last year, we r… READ MORE

TPM and SED Solutions to Failed Key and Certification Management and the Ponemon Report

Date Published: January, 01, 2015

Ponemon Institute has just released a the "2013 Annual Cost of Failed Trust Report: Threats and Attacks."  It showed that the cost of failed key and certificate management threatens the security of enterprises around the world - while costing $400 millio… READ MORE