In the News

No One Else’s Business: Crucial Steps in Achieving Effective Organizational Trusted Computing

Date Published: June, 16, 2020

The dawn of 5G and the Internet of Things (IoT) era is rapidly approaching, facilitating the design and development of innovative devices with greater capabilities. COVID-19 is further driving this industry at a tremendous pace as companies seek more agil… READ MORE

Ensuring cybersecurity resilience in an ultra-connected world

Date Published: June, 04, 2020

The development of the Internet of Things (IoT), Artificial Intelligence (AI), the cloud and big data have enabled devices that started out as unbelievable concepts to become a reality. From a consumer standpoint, these ever-increasing trends are often ta… READ MORE

Trust and Transparency in the Hardware Supply Chain

Date Published: May, 20, 2020

Organizations invest a lot of resources and effort to secure and protect their devices and IT environment, but there is growing concern over the parts that make up the equipment. The supply chain exposes organizations to risk because counterfeit parts may… READ MORE

IoT-verdenen gjenoppdager PC-problemene

Date Published: April, 24, 2020

IoT-verdenen gjenoppdager nå de samme problemene PC- og IKT-industrien hadde når det gjelder sikkerhet. Derfor har vi videreutviklet TPM for dette markedet… READ MORE

Secure Updating is Key to Protecting Billions of Devices: Published on Page 31 of Components in Electronics Magazine

Date Published: April, 24, 2020

With the constant emergence of new technology and predictions that there will be more than 21 billion IoT devices by 2025, the security threat landscape for embedded systems is evolving at a rate which can be difficult to keep pace with. Network-enabled e… READ MORE

Expanding Trust in Mobile Devices

Date Published: April, 23, 2020

For many people, their mobile device, serves as their primary computer in day-to-day life. Modern mobile devices offer a rich, flexible set of features and allow users to add new features just by downloading applications. Users can manage virtually every … READ MORE

IEC 62443: How to achieve the highest levels of industrial security

Date Published: April, 17, 2020

With the emergence of industry 4.0 and the ever-increasing adoption of the Industrial Internet of Things (IIoT), says Steve Hanna, co-chair of TCG’s Embedded Systems Work Group, the Industrial Automation and Control Systems industry faces some exciti… READ MORE

Secure memories in a connected world

Date Published: February, 24, 2020

See Trusted Computing Group featured in CIE Online's February 2020 issue on mobile technology. Read the TCG feature here on page 30.… READ MORE

Secure Firmware and Software Updates a Matter of Trust

Date Published: February, 20, 2020

A lot has been written recently about the increasing network connectivity of embedded devices found in a wide array of smart applications and platforms, including automobiles, household appliances, industrial systems and medical equipment, and the subsequ… READ MORE

TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems

Date Published: February, 11, 2020

Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems.… READ MORE