In the News

Microsoft: TPM 2.0 support now mandatory for all Windows 10 devices

Date Published: August, 02, 2016

MICROSOFT HAS MADE IT MANDATORY for all Windows 10 PCs, smartphones and tablets to support the Trusted Platform Module 2.0 (TPM 2.0) standard. Microsoft is mandating the hardware changes in a bid to improve Windows security, as it incorporates support fo… READ MORE

CIA and TPM to Secure the IoT? – Embedded Computing Design

Date Published: July, 12, 2016

CIA, TPM and IoT: You might ask what these three acronyms have in common and how they relate to each other. To make a long story short, it is all about security, trust, and reliability. The abbreviation CIA in this context does not mean the Central Intell… READ MORE

What Is a TPM Chip? – www.laptopmag.com

Date Published: June, 06, 2016

By Henry T. Casey PC makers often list a Trusted Platform Module (TPM) as a security feature for business notebooks and desktops, but you may not know what it is or why it's useful. Primarily, the TPM enhances security above and beyond the capabilities o… READ MORE

RSA Shows How To Trust Your Digital Storage

Date Published: March, 17, 2016

Protecting sensitive personal and business data is a big concern, with all the reports of hacking and identity theft. The RSA Conference focuses on digital security trends, threats and products. The Trusted Computing Group (TCG) was an important participa… READ MORE

RSA Conference 2016, Day One

Date Published: March, 02, 2016

The first day of 2016's RSA Security Conference is in the books, and the ESG team offered some thoughts from San Francisco on the sights, sounds, and news from the event: Doug Cahill, Senior Analyst The first day of the RSA Conference is as much about t… READ MORE

Google: Lessons of Android Shape IoT Vision

Date Published: February, 01, 2016

In-brief: A prominent Googler says the company is committed to keeping the Android operating system open source, but wouldn’t mind the security benefits that come with Apple’s closed iOS ecosystem, either! Google’s Android operating system has prov… READ MORE

RSA Conference 2016: Day 1

Date Published: February, 01, 2016

Day 1 of the 2016 RSA Conference. Vendors are still setting up their booths in the exhibition hall but the sessions have begun in earnest. Here are a few highlights of what I’ve heard so far:   ted talk Four mindblowing Ted Talks for techies TED ta… READ MORE

Trusted Computing Group and Industrial Internet Consortium team via liaison relationship for better IoT security

Date Published: January, 01, 2016

Trusted Computing Group has been working for more than a dozen years to provide baseline technologies and industry standards for securing devices, data, and networks. Its greatest hits list includes the Trusted Platform Module, or TPM, which to date has b… READ MORE

Storage Visions Conference

Date Published: January, 01, 2016

The Storage Visions Conference, January 4 & 5, 2016 at the Luxor Hotel in Las Vegas will include a keynote talk by Barbara Murphy, from HGST on Elastic Storage and Active Archives. The conference theme is: Storage for the Next 5,000 Years (inspired b… READ MORE

End-to-End IoT Security Starts with the Infrastructure

Date Published: January, 01, 2016

It’s been three months into your embedded development, and the engineering team just reported the security architecture design is complete. Hardware, operating system, algorithms, protocols, everything is ready to start developing—that is, until someo… READ MORE