Earlier this year, TCG hosted two dozen terrific demonstrations at the RSA Conference during its seminar sessions. Among those demos was something that is becoming very compelling for many companies: protecting intellectual property from attacks and other threats. A free TCG webcast June 7 will look more closely at this issue and how it can be solved using TCG standards-based security solutions.
So what is the problem? WIBU described it as “Attackers often use reverse engineering to find software vulnerabilities that they can exploit to create counterfeit products, steal sensitive data, or tamper with for sabotage and espionage purposes. With embedded systems, this can lead to serious and dangerous hacks, as recent attacks on safety-critical automotive components have shown.”
How can trusted computing help? The the June 7 webcast will discuss how to protect software integrity against cyber violations and safeguard the intellectual property. The webcast will explain how secured code and licenses bound to a secure element, a hardware dongle or a TPM.
Watch the recorded webcast here.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.