What: The Trusted Computing Group will host a free webinar on how to use the TPM, or Trusted Platform Module, to solve today’s cybersecurity problems.
With the recent discovery of the flaw in OpenSSL, Heartbleed, even the least computer-savvy among us has has seen the potential threat and damage caused by cybersecurity problems. And Heartbleed is just one of many attacks, breaches, viruses, and more that just keep coming.
How can enterprise users best protect against and mitigate many security issues?
This webinar will address a fundamental and key aspect to IT security: the root of trust. Embedded into devices, the root of trust, typically implemented by the TPM, provides a proven, safe foundation for more secure computing.
Learn the key concepts of trusted systems, why they’re critical to establishing security and supporting other solutions and what is new with the TPM.
When: Tues., May 20, 1:00 p.m. East/10:00 a.m. Pacific.
Where: To get more info or to register for the webinar, go to:
Tweet this: Join @TrustedComputin for May 20 webinar on locking down certificates, keys, PWs with root of trust #TPM #heartbleed http://bit.ly/1ttwuBx
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.