TCG Blog

TCG to Talk Industrial IoT Security in Barcelona, IoT Solutions World Congress, October 3

Date Published: August, 02, 2017

TCG members and security experts are hosting a special session, How to Build Secure, Highly Reliable Critical Systems and Networks for the IoT on October 3, 2017 at the IoT Solutions World Congress (link to https://trustedcomputinggroup.org/press-rooms/… READ MORE

Securing Network Gear Critical to IoT and Enterprise Security; TCG Needs Your Input Now!

Date Published: July, 20, 2017

Trusted Computing Group recently announced new work to secure the critical network gear that the Internet and connected things rely on. The group is now seeking input from the industry through Sept. 11, 2017. Input can be sent to admin@trustedcomputinggro… READ MORE

Warding off Ransomware Threats in Industrial Control Systems: (Part 2)

Date Published: July, 06, 2017

Part 1 of this blog series discussed how users and enterprises that delayed the implementation of a previously discovered vulnerability in the Windows operating system became victims of the WannaCry ransomware. Since all organizations with industrial cont… READ MORE

TCG Awarded Best of Show, IoT Evolution Expo Las Vegas 2017, for Security

Date Published: July, 02, 2017

Last week, TCG attended the IoT Evolution Expo in Las Vegas. With member representatives from Infineon and Mocana, we demonstrated multiple TCG standards and specifications and how they’re used to protect the IoT. We also participated in three panel ses… READ MORE

WannaCry Delivers a Wake-up Call for Protecting Industrial Control Systems: (Part 1)

Date Published: June, 29, 2017

The recent ransomware worm in the WannaCrypt or WannaCry (Wcry) malware infected more than 200,000 systems across 150 countries. The virus targeted out of date computing systems not unlike those that can be found in an industrial control system (ICS). Whi… READ MORE

TCG’s Steve Hanna Talks IoT Security with IoT Evolution in New Podcast

Date Published: June, 26, 2017

TCG’s Steve Hanna often speaks and writes on the concepts of trusted computing and its role in helping secure the very vulnerable IoT and embedded systems in his role as co-chair of several TCG work groups. This week, Steve sits down with Ken Briodagh,… READ MORE

TCG Releases Trust Assessment Framework

Date Published: June, 18, 2017

In today’s enterprise, cloud computing allows enterprises to acquire or maintain computer services without building the infrastructure themselves. Cloud services often are combined with in-house infrastructure in a model that’s known as the hybrid clo… READ MORE

TCGメンバーの株式会社リコー”21回日本医療情報学会春季学術大会 シンポジウム 2017″にてTPM 搭載デジタル複合機を展示

Date Published: June, 01, 2017

Trusted Computing Groupメンバーの株式会社リコーは、6月1日から3日まで 福井市 フェニックス・プラザで開催中の「第21回日本医療情報学会春季学術大会 シンポジウム 2017 in 福井」の企業出展に�… READ MORE

2017 International Cryptographic Module Conference and FDE cPPs

Date Published: May, 31, 2017

From May 17th to 19th, I had the pleasure of attending the Fifth International Cryptographic Module Conference (ICMC 2017 http://icmconference.org/ ) with my colleague, Alexander Mazuruc.   Alex usually attends this conference (https://www.winmagic.com/… READ MORE

Trusted Secure Networks Front and Center at Interop ITX Event May 2017

Date Published: May, 25, 2017

This year’s Interop ITX event provided attendees with a new variety of products, presentations and technical talks. The Internet of Things and its connectivity, along with security, contained in the spotlight as vendors attempted to pitch their many sol… READ MORE