Date Published: February, 26, 2018
Auto makers have long struggled with the recall issue. A significant portion of recalls are associated now with software updates to our rolling computers, aka cars. These increasingly complex systems of course require the same patches and updates any comp… READ MOREDate Published: February, 14, 2018
In the last year or so, TCG members active in developing and supporting network equipment, such as switches, routers and firewalls, have been actively working to develop specific guidance and how-to for protecting these devices against attacks. Why wor… READ MOREDate Published: January, 25, 2018
A new post in Embedded Computing Design by Microsoft’s Dennis Mattoon, also the chair of TCG’s DICE Work Group, explains how the Device Identifier Composition Engine, or DICE, is used to provide a hardware-based root of trust for IoT and embedded syst… READ MOREDate Published: January, 05, 2018
On Feb. 15, 10:00 a.m. Pacific/1:00 p.m., TCG will host a webcast on using the new TCG software stack for securing devices and data. Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs… READ MOREDate Published: December, 13, 2017
Technology distributor Avnet has announced a new security peripheral module based on the TPM 2.0. This module is targeted to Industrial IoT applications, such as factory automation, smart grid and healthcare and will provide a hardware root of trust for p… READ MOREDate Published: November, 30, 2017
Steve Hanna, Infineon and co-chair or chair of TCG’s embedded systems, IoT and Industrial Work Groups, will speak at the IoT Evolution Expo (http://www.iotevolutionexpo.com/east/) on Wednesday, January 24, 2018, at 3:00 p.m. – 3:55 p.m. ET in a sessi… READ MOREDate Published: November, 21, 2017
The Trusted Computing Group has released a new version of its Trusted Network Communications (TNC) Architecture specification. TNC enables intelligent policy decisions, dynamic security enforcement, and communication between security systems. These capabi… READ MOREDate Published: October, 31, 2017
TCG members continue working to create devices and applications to use the TPM 2.0, which offers many benefits for security. The 2.0 approach gives developers and designers many options to use key attributes and to apply them for protecting keys and certi… READ MOREDate Published: October, 04, 2017
TCG and Drive Trust Alliance will host a demo session at the 2017 Storage Visions Conference (SV 2017) Monday, October 16, 2017, in Milpitas, CA (www.storagevisions.com). The conference will feature a panel on memory-centric computing and a session on … READ MOREDate Published: September, 28, 2017
Unsecured industrial equipment has been the entry point for many recent attacks, including widely reported ones on a steel mill, the Ukrainian power grid, nuclear facilities and much more. Traditionally, most industrial systems were stand-alone and not co… READ MORE