Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.
The information your computing device contains today is more important than the actual device itself, so it is important to protect it from unauthorized access. While there are several third-party apps to help you with this, Windows has its own built-in encryption tool, BitLocker. BitLocker works [...]
With a cyberattack occurring every 39 seconds, not only are they becoming more frequent, they are becoming more sophisticated and premeditated. Attackers have begun targeting supply chains, which is especially worrying as one attack can create a chain reaction and compromise a network of providers. [...]
A new era of computing requires a new kind of cryptography. Cybersecurity has become one of the hottest topics in the modern digital world. How to make cybersecurity solutions trustworthy is a highly relevant question. Cybersecurity solutions make use of cryptographic mechanisms, so trusting in t [...]
Businesses in all industries are extremely vulnerable to quantum computing attacks, with a new report from the Trusted Computing Group (TCG) finding that 91% of security professionals within the USA and Europe have no formal post quantum cryptography (PQC) roadmap in place. While many experts now [...]
Software developers and students interested in device security will be given the chance to enhance their cybersecurity skills and the security of devices through a new technical security training program from the Trusted Computing Group (TCG) and OpenSecurityTraining2 (OST2). The ‘Trusted Compu [...]
The Trusted Computing Group (TCG) has announced Arm has today joined the Board of Directors, with Dong Wei appointed as its representative. The ubiquitous Arm compute platform touches 100 percent of the connected population, with over 300 billion Arm-based chips powering devices and solutions fro [...]
Introduction The rise of fully autonomous vehicles may soon render car ownership obsolete, as ride-sharing companies like Uber embrace the concept of driverless cars. To survive, automotive manufacturers must develop business models that allow feature activation to be tied both to the user as wel [...]
SEC-TPM™ stands as an industry first, pioneering security in Edge AI and enhancing application data privacy for confidential computing AI security and data privacy have received a major boost today as SecEdge joined the Trusted Computing Group (TCG) approved vendor com [...]
STMicroelectronics today announced the FIPS 140-3 certification of STSAFE-TPM trusted platform modules (TPMs), the first standardized cryptographic modules on the market to receive this certificate. The newly certified TPMs, the ST33KTPM2X, ST33KTPM2XSPI, ST33KTPM2XI2C, ST33KTPM2I and ST33KTPM2A [...]
A company of NEC, Cyber Defense Institute (CDI), a Japanese Cyber Security Company, launches the cloud-based private certification authority solution PIV Gateway™ CA that supports not only traditional X.509 certificate issuance but also emphasizes the issuance of Platform Certificates. Accordin [...]