Search Resources

Clear Search


   

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at rest protection”. This joint whitepaper describes the Trusted Computing Group Storage Work Gro... READ MORE

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previously inaccessible with legacy devices. The modern workforce is demanding mobile device access to busi... READ MORE

Federal CIO Council BYOD Toolkit

Developed by the Federal CIO Council, this document serves as a toolkit in implementing BYOD programs within federal agencies. A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs ... READ MORE

Secure Embedded Platforms with Trusted Computing: Automotive and Other Systems in the Internet of Things Must Be Protected

The embedded systems market is going through a profound transformation right now. Historically, embedded systems builders assumed that their systems were ultimately built to stand alone. Typical embedded systems, such as those in today’s automobiles, might contain more than a hundred individual processors, with multiple in-vehicle networks and millions of lines of code. Even so, the vehicle is a... READ MORE

Comply to Connect Solution Overview

Comply to Connect is a standards-based solution that addresses the problems many organizations face: how to ensure network security while allowing a wide range of individual devices to connect. Comply to Connect is a standards-based solution that addresses the problems many organizations face: how to ensure network security while allowing a wide range of individual devices to connect. There is ... READ MORE

Trusted Network Connect: Open Standards for Integrity-based Network Access Control

Unlike yesterday’s passive cyber-threats, which depended upon users’ actions for transmission, today’s stealthier tactics infect entire networks without any user involvement. Read this whitepaper to learn more. Recently we have seen cyberthreats evolving from being passive requiring users' actions for transmission, to stealthier tactics that would infect entire network without any user invol... READ MORE

Expanded IF-MAP 2.0 Addresses a Broader Set of Applications

Changes in IF-MAP 2.0 enable new applications in fields such as cloud computing, Industrial Control Systems and SCADA security, physical security, and more. This whitepaper describes those changes and the potential implications. To enable and ease new applications of IF-MAP, TCG has now separated IF-MAP into a base protocol (IF-MAP 2.0) and a set of network security metadata (IF-MAP Metadata for ... READ MORE

TNC and SCAP: An Integrated Solution for Automating Security

Detecting and thwarting the threats and vulnerabilities of today's computer systems and networks have challenged technical professionals from numerous companies and government organizations. NIST's SCAP was created as a community effort to create a common set of standards to help express and automate configuration management. The SCAP standards provide a common language for organizations to perfor... READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.