TCG Blog

Trusted Computing Group TPM Adds Security to Platforms Using Windows 8 and Windows Server 2012

Date Published: January, 01, 2015

Trusted Computing Group TPM Adds Security to Platforms Using Windows 8 and Windows Server 2012 Date Published: December 6, 2012 PORTLAND, Ore., Dec. 6, 2012 – PCs and mobile devices using the new Windows 8operating system and Windows Server 2012 will be… READ MORE

IF-MAP 2.2 – Learning from Experience

Date Published: January, 01, 2015

IF-MAP, the interface for a Metadata Access Point, is a standard client/server protocol for accessing a Metadata Access Point (MAP). The MAP acts as a central clearinghouse for information about network security objects and events, such as users, devices,… READ MORE

TPM Secures Wireless Access Points

Date Published: January, 01, 2015

Much has been made recently of unsecured certificates and passwords. TheHeartbleed OpenSSL vulnerability, which left keys in the open and vulnerable to hackers, alone has created countless hours of work and coverage. And lost or stolen passwords and keys … READ MORE

Complete Set of NAC Standards From IETF and TCG

Date Published: January, 01, 2015

For years, TCG and IETF have been working together to create a complete set of Network Access Control (NAC) standards recognized and approved by both groups. This week, we achieved that goal. IETF has released RFC 7171 (PT-EAP) and TCG has released IF-T/… READ MORE

Fending off Attacks On the Robots: TCG Specification for Network Segmentation

Date Published: January, 01, 2015

While much is made of an ‘attack of the robots’ displacing tens of millions of workers from once job-rich industries, but those charged with safeguarding the workings of modern society are preoccupied with another assault – attacks on the robots and… READ MORE

Trust and Industrial Control Systems

Date Published: January, 01, 2015

Industrial control systems, or ICS, security remains a big issue with associated compliance, legal and financial implications. On a higher level, protecting infrastructure is a matter of national security for nations worldwide. A recap of a recent securi… READ MORE

Shouldn’t Security Be a Standard? Thanks, Atmel!

Date Published: January, 01, 2015

The attacks and hacks keep coming. Atmel, a long-time TCG member and provider of the TPM, has commented in a new blog, “Shouldn’t Security Be a Standard?”. Indeed. As Atmel says, “…TPM, which stands for Trusted Platform Module, can be thought o… READ MORE

Creating a Strong Foundation for Mobile Security with the Mobile TPM

Date Published: January, 01, 2015

The British newspaper The Telegraph recently reported that the three biggest issues for mobile security are data loss, theft, malware and unsecured networks – no big surprise there for those of us in the industry. Business and trade publications likewi… READ MORE

TPM as Virtual Smart Card – A No-Brainer?

Date Published: January, 01, 2015

At the Trusted Cyber Collaboration Workshop, experts from Infineon, Wave Systems, HP, Wave Systems and Asguard Networks addressed a number of trending security issues and the role of trust in helping solve them. John Fitzgerald of Wave Systems addressed … READ MORE

TNC Certification

Date Published: January, 01, 2015

TNC Certification TNC Certification is open to both TCG members and non-TCG members.  Each individual IF-xx interface (described in more detail at the bottom of this page) for a product is available for certification.  Any combination… READ MORE