Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

A detailed guide to BitLocker for Windows 11 users

The information your computing device contains today is more important than the actual device itself, so it is important to protect it from unauthorized access. While there are several third-party apps to help you with this, Windows has its own built-in encryption tool, BitLocker. BitLocker works [...]

Protecting the Healthcare Sector from Supply Chain Security Attacks

With a cyberattack occurring every 39 seconds, not only are they becoming more frequent, they are becoming more sophisticated and premeditated. Attackers have begun targeting supply chains, which is especially worrying as one attack can create a chain reaction and compromise a network of providers. [...]

Cybersecurity in the quantum age

A new era of computing requires a new kind of cryptography. Cybersecurity has become one of the hottest topics in the modern digital world. How to make cybersecurity solutions trustworthy is a highly relevant question. Cybersecurity solutions make use of cryptographic mechanisms, so trusting in t [...]

See More

TCG News Releases

91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey

Businesses in all industries are extremely vulnerable to quantum computing attacks, with a new report from the Trusted Computing Group (TCG) finding that 91% of security professionals within the USA and Europe have no formal post quantum cryptography (PQC) roadmap in place. While many experts now [...]

TCG and OST2 Expands Curriculum for Developing Cybersecurity Experts in Trusted Computing

Software developers and students interested in device security will be given the chance to enhance their cybersecurity skills and the security of devices through a new technical security training program from the Trusted Computing Group (TCG) and OpenSecurityTraining2 (OST2). The ‘Trusted Compu [...]

TCG welcomes Arm as new board member to make trusted computing a core pillar of system architecture

The Trusted Computing Group (TCG) has announced Arm has today joined the Board of Directors, with Dong Wei appointed as its representative. The ubiquitous Arm compute platform touches 100 percent of the connected population, with over 300 billion Arm-based chips powering devices and solutions fro [...]

See More

Whitepapers & Guides

Overcoming threats to Vehicle Security with Secure Role and Rights Management

Introduction The rise of fully autonomous vehicles may soon render car ownership obsolete, as ride-sharing companies like Uber embrace the concept of driverless cars. To survive, automotive manufacturers must develop business models that allow feature activation to be tied both to the user as wel [...]

See More

Member News Releases

SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon

SEC-TPM™ stands as an industry first, pioneering security in Edge AI and enhancing application data privacy for confidential computing AI security and data privacy have received a major boost today as SecEdge joined the Trusted Computing Group (TCG) approved vendor com [...]

STMicroelectronics delivers industry’s first FIPS 140-3 certified TPMs for computer, server, and embedded systems

STMicroelectronics today announced the FIPS 140-3 certification of STSAFE-TPM trusted platform modules (TPMs), the first standardized cryptographic modules on the market to receive this certificate. The newly certified TPMs, the ST33KTPM2X, ST33KTPM2XSPI, ST33KTPM2XI2C, ST33KTPM2I and ST33KTPM2A [...]

World’s First Commercial Certification Authority Supporting the Issuance of Platform Certificates

A company of NEC, Cyber Defense Institute (CDI), a Japanese Cyber Security Company, launches the cloud-based private certification authority solution PIV Gateway™ CA that supports not only traditional X.509 certificate issuance but also emphasizes the issuance of Platform Certificates. Accordin [...]

See More

Images & Graphics

See More