The explosion of intelligent connected devices, or the Internet of Things (IoT), presents a massive expansion of the “attack surface” hackers can target. Many of these devices are difficult or impossible to access, impractical to reboot for security updates, or poorly managed – and most embedded and IoT devices were not designed with security in mind.
For embedded and IoT developers and designers, security should not be an afterthought. After all, your device likely will interface with other devices over a network and likely will contain and communicate data that should not fall into the wrong hands.
Trusted Computing Group, with its long experience in enterprise security, offers a standards-based approach to securing embedded and IoT systems at their foundation. This base security can include securing secrets such as keys, certificates, and passwords; helping prevent malware; and ensuring integrity and identity.
Learn more here:
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.