TCG Blog

Content Creators Need Assurance Their Data is Safe and Available, Say Experts with the Creative Storage Conference

Date Published: May, 16, 2017

On May 24, 2017, experts in data storage and content creation will converge in the land of movie-making, Los Angeles, to tackle the topic of how to store and secure all that valuable IP. Recent hacks, such as that of the NetFix series “Orange is the New… READ MORE

@Interop ITX to Showcase TCG IoT and Network Security Solutions May 16-18

Date Published: May, 12, 2017

TCG members CoSoSys, Mocana, OnBoard Security and Tempered Networks will show a variety of solutions in booth #234 in the Interop Business Hall on Tuesday, May 16 through Thursday, May 18, 2017. Demos will include implementation of the Trusted Software… READ MORE

How Embedded and IoT Designers and Developers Think About Security – A Look at Survey Data and the Way Forward

Date Published: May, 11, 2017

IoT devices now outnumber humans (http://www.nextgov.com/technology-news/tech-insider/2017/04/hackers-pov-internet-things-security/137292/). Security practices have not followed suit, however, with well-publicized attacks and hacks as varied as a damaging… READ MORE

TCG Members to Show IoT and Network Security Solutions at Interop ITX May 16-18, 2017

Date Published: April, 10, 2017

TCG and members will return to Interop May 16-18, 2017 (@Interop) in Las Vegas to demonstrate and talk about new ways to secure the IoT and networks. Interop ITX has expanded its focus to include the increasingly connected world of things and associated s… READ MORE

Tags: ,

Join Webcast to Learn How Embedded and IoT Designers View Security, Hosted by TCG with Embedded Computing Design

Date Published: April, 10, 2017

TCG will host a webcast Monday, April 24, 10 a.m. Pacific/1 p.m. Eastern, to talk about how embedded systems and IoT designers, developers and others in the ecosystem think about security. TCG recently sponsored a survey with Embedded Computing Design to … READ MORE

How Do Embedded and IoT Designers Think About Security? TCG and Embedded Computing Design Look at the Survey Data

Date Published: March, 20, 2017

Earlier this year, Embedded Computing Design with TCG conducted a survey of more than 250 embedded and IoT developers and designers to learn more about how they view, plan and implement security. Not surprisingly, many are concerned about security and s… READ MORE

TPM from PCs to the IoT

Date Published: March, 13, 2017

Approaching its teen years, the Trusted Platform Module, or TPM, has experience inevitable growing pains. In the last few years, TCG members have collectively provided extensive input and expertise around security, system design and development, networkin… READ MORE

Trust, TPM and Manufacturing

Date Published: March, 07, 2017

For many companies, the weakest security link the company is the manufacturing network. A recently published  blog post in Embedded Computing Design (http://embedded-computing.com/guest-blogs/securing-a-factorys-ot-network-and-the-role-of-trust/#) by TCG… READ MORE

Remembering Frank Molsberry

Date Published: February, 28, 2017

Trusted Computing Group has recently lost one of its great long-time champions.  Frank Molsberry, who capably represented Dell for a number of years on the TCG Board of Directors, passed away on Feb. 16, 2017. Frank was known among TCG members for his… READ MORE

Tell Us About Your Internet of Things (IoT) and Embedded Systems Security Fears, Plans and Ideas

Date Published: January, 30, 2017

Trusted Computing Group (TCG) has teamed with Embedded Computing Design to find out more about how developers and designers, as well as providers of various elements of these systems, are thinking about security. We all know that traditional embedded s… READ MORE