Search Resources

Clear Search


   

Trusting Your Supply Chain

The Trusted Computing Group’s Trusted Platform Module (TPM) and Trusted Network Connect (TNC) standards can play important roles in supply chain security. These tools can be applied by both small and large companies. Latest Version: Trusting Your Supply Chain... READ MORE

Establishing Network Equipment Security

Firewalls and gateway routers are already important components of any organization’s network security strategy. But network architects can often overlook the fact that the networking equipment itself can be attacked. Ensuring these devices are resistant to attacks is just as important as conventional security mechanisms that protect PCs and servers. Latest Version: Establishing Network E... READ MORE

第8回JRF公開ワークショップを終えて

2009年に始めたTCGの日本支部による公開ワークショップも今回で8回目を数え、去る11月2日に無事に開催することが出来ました。 ここ数年は100名を超える方々にお越しいただき、本ワークショップでしか出来ない議論を活発に実施させていただいています。標準化団体であるTCGは、その技術を社会... READ MORE

Webcast: Save the Data: How to Protect Data Wherever It Lives

{ "channelId" : 7423, "language": "en-US", "commId" : 231413, "displayMode" : "standalone", "height" : "auto" } Data has exploded across devices and anything with memory. No matter where it lives and whatever it is - sensitive personal, medical, financial, business data, photos and music – all such data is highly vulnerable, In fact, breaches occur daily and the growing number of interconnect... READ MORE

Trusted Platform Module 2.0: A Brief Introduction

The Trusted Computing Group (TCG) has been addressing the trust issue – and related security benefits – for PCs, servers, networking gear and embedded systems for more than a decade, driven by the Trusted Platform Module (TPM) specification. Latest Version: Trusted Platform Module 2.0: A Brief Introduction Latest TPM Specification: TPM Library Specification... READ MORE

TCG TPM I2C Interface Specification

The Trusted Computing Group TPM I2C Interface Specification is an industry specification that defines an I2C Interface for TPM 2.0. As this specification defines only the interface for the I2C-TPM a suitable platform specification must be considered additionally to allow the design of a platform specific I2C-TPM. It is expected that the reader of this specification is familiar with the PTP [2].... READ MORE

Webcast: Securing IoT Endpoints, Networks and the Cloud

Endpoints in the IoT by nature are vulnerable to many kinds of attacks and exploits. Widely vetted security approaches can help close these vulnerabilities while also protecting networks and data that is stored in the cloud. This webcast, hosted by Trusted Computing Group and its members GlobalSign and Cisco, will illustrate key techniques for closing critical IoT sec... READ MORE

TCG Guidance for Securing Resource-Constrained Devices

This reference document provides implementation guidance for trusted platforms built with resource-constrained devices. This reference document is not a TCG Specification and therefore is not normative. Latest Version: TCG Guidance for Securing Resource-Constrained Devices Version 1 Revision 17 ... READ MORE

TCG Storage Opal SSC Feature Set: Configurable Namespace Locking

The Storage Workgroup specifications provide a comprehensive architecture for Storage Devices under policy control as determined by the trusted platform host, the capabilities of the Storage Device to conform to the policies of the trusted platform, and the lifecycle state of the Storage Device as a Trusted Peripheral. Public Review: TCG Storage Opal SSC Feature Set: Configurable Namespace Lock... READ MORE

TCG Glossary

This glossary contains definitions of terms created by TCG, or terms that have a particular meaning in trusted computing, or terms that cause particular confusion in trusted computing. TCG Glossary... READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.