Date Published: September, 18, 2017
TCG has been working to provide enabling security solutions for embedded and IoT for some time. The group has work groups working in automotive security (https://trustedcomputinggroup.org/tcg-tpm-2-0-library-profile-automotive-thin/), including using a TP… READ MOREDate Published: August, 22, 2017
As of 2016, more than half of Internet users access the web on mobile devices. The BYOD, Choose Your Own Device, and enterprise-owned device models mean that business and personal data now coexist on the same device. All of these devices mean even more at… READ MOREDate Published: August, 09, 2017
TCG has teamed up with Embedded Computing Design to host a new series of podcasts (http://ow.ly/8gRO30eieqr) addressing IoT and embedded design, development and security issues. ECD’s Rich Nass and Brandon Lewis talk with Jeff Finn, CEO of data categor… READ MOREDate Published: August, 02, 2017
TCG members and security experts are hosting a special session, How to Build Secure, Highly Reliable Critical Systems and Networks for the IoT on October 3, 2017 at the IoT Solutions World Congress (link to https://trustedcomputinggroup.org/press-rooms/… READ MOREDate Published: July, 20, 2017
Trusted Computing Group recently announced new work to secure the critical network gear that the Internet and connected things rely on. The group is now seeking input from the industry through Sept. 11, 2017. Input can be sent to admin@trustedcomputinggro… READ MOREDate Published: July, 06, 2017
Part 1 of this blog series discussed how users and enterprises that delayed the implementation of a previously discovered vulnerability in the Windows operating system became victims of the WannaCry ransomware. Since all organizations with industrial cont… READ MOREDate Published: July, 02, 2017
Last week, TCG attended the IoT Evolution Expo in Las Vegas. With member representatives from Infineon and Mocana, we demonstrated multiple TCG standards and specifications and how they’re used to protect the IoT. We also participated in three panel ses… READ MOREDate Published: June, 29, 2017
The recent ransomware worm in the WannaCrypt or WannaCry (Wcry) malware infected more than 200,000 systems across 150 countries. The virus targeted out of date computing systems not unlike those that can be found in an industrial control system (ICS). Whi… READ MOREDate Published: June, 26, 2017
TCG’s Steve Hanna often speaks and writes on the concepts of trusted computing and its role in helping secure the very vulnerable IoT and embedded systems in his role as co-chair of several TCG work groups. This week, Steve sits down with Ken Briodagh,… READ MOREDate Published: June, 18, 2017
In today’s enterprise, cloud computing allows enterprises to acquire or maintain computer services without building the infrastructure themselves. Cloud services often are combined with in-house infrastructure in a model that’s known as the hybrid clo… READ MORE