A recent article in Federal Technology Insider provided some interesting outtakes on the use of Trusted Computing by US federal agencies and related bodies. The article notes the recent publication of NIST documents 800-147, 800-155 and 800-164, all of which heavily reference and recommend various trusted computing technologies and standards.
The article also notes that the TPM is no longer a niche technology, echoing an Aberdeen report that points out widespread support and applications for the TPM that are included in Windows, the need to protect smartphones, the weaknesses of software security generally and wider support for TCG and its standards.
For those who still wonder “who is using trusted computing and the TPM?”, the article notes that in addition to ubiquitous support via the operating system and server side of the OS, vendors such as Google with its Chromebook and Boeing with its secure Black phone are relying on the TPM and a root of trust to protect software and prevent devices from being attacked.
Read more here, http://www.federaltechnologyinsider.com.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.