Search Resources

Clear Search


Extending Network Access Control

Podcast on TNC Standards available from Juniper Networks To view the podcast (requires Quicktime) vist: READ MORE

Where is your Data Tonight? A Lesson in Avoiding Headlines, Fines or Worse

Where is Your Data Tonight? A Lesson in Avoiding Headlines, Fines or Worse. from Trusted Computing Group on Vimeo. In addition to the video above, please reference the PowerPoint presentation related for the Information Week SED Webinar. Since 2005, over 500 million sensitive records have been lost, stolen or mishandled. A slew of regulations now require breach notification, meaning ente... READ MORE

Automate to Win: The Business Case for Standards-based Security

Thank you for joining us for the April 26, 2011 webinar about the TNC network security architecture, open standards created by the Trusted Computing Group, and the products that have implemented those standards. Racks of network security gear. Megabytes of logs. Thousands of new attack attempts each day. Vendors knocking down the door with their latest silver bullet product. How can an informati... READ MORE

Commonly Asked Questions and Answers - TNC/InformationWeek Webcast

Answers to the questions posed during TCG's webcast on April 26, 2011, "Automate to Win: The Business Case for Standards-based Security". Trusted Computing Group (TCG) with Information Week recently sponsored the webcasts "Automate to Win: A Business Case for Standards-Based Security," with Steve Hanna of TCG and Juniper Networks and Craig Dupler, Boeing. The archived webcast can be found at http:... READ MORE

Implementing Hardware Roots of Trust

SANS Institute has developed a first-of-its-kind guide and informational webcast to update organizations on exciting new uses for implementing hardware roots of trust, enabled by the Trusted Platform Module. Learn How to Implement a Ubiquitous Technology Already Embedded in Enterprise Endpoints In this document SANS looks at the broad industry support for TPM, the standards behind it. The repo... READ MORE

Securing IoT with Trusted Computing

Securing IoT with Trusted Computing Securing IoT with Trusted Computing demonstration built by Trusted Computing Group member companies Cisco, Infineon, and Intel with the assistance of Applied Sciences, Rapperswil, presented at RSA 2015 during the the TCG Association Seminar and Demonstration Showcase: Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions. Dowloa... READ MORE

Industrial Control System (ICS) Security Using TNC Technology

This webcast, based on TCG's Architect’s Guide, shows information technology and control systems executives and architects how to implement a standards-based, interoperable approach to ICS security as specified in ISA 99 (now IEC 62443) and ISA 100.15. Attendees heard from leading ICS experts regarding these standards and how IT and control system executives and architects can implement a... READ MORE

Webcast: Protecting Intellectual Property in the IoT with Trusted Computing

Loss of IP Can Cost Companies Millions – or Even the Business. Join this Webcast to Learn How to Protect Data in the Internet of Things Attackers often use reverse engineering to locate software vulnerabilities that they then can exploit to create counterfeit products, steal sensitive data, or tamper with for sabotage and espionage purposes. In IoT and embedded systems, this can lead ... READ MORE

Webcast: Securing IoT Endpoints, Networks and the Cloud

Endpoints in the IoT by nature are vulnerable to many kinds of attacks and exploits. Widely vetted security approaches can help close these vulnerabilities while also protecting networks and data that is stored in the cloud. This webcast, hosted by Trusted Computing Group and its members GlobalSign and Cisco, will illustrate key techniques for closing critical IoT sec... READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.