TCG Webcast February 15 to Show TPM and New Trusted Software Stack for Integrity, Authentication, Health Monitoring and More.

PORTLAND, Ore., Jan. 30, 2018 – How to use the Trusted Platform Module? Trusted Computing Group (@TrustedComputin) will address that question and more in a webcast, How to Implement Trusted Platforms and EcoSystems, Thursday, Feb. 15, 1:00 p.m. Eastern/10 a.m. Pacific.

Trusted Computing provides foundational security for enterprise, embedded and IoT devices to prevent breaches, data loss and attacks.

Long-time TPM and Trusted Software Stack expert Lee Wilson, OnBoard Security and chair of TCG’s Software Stack (TSS) and Virtualized Platform Work Groups, will review the key attributes of the TPM and how the new TCG TSS can be used for bottoms-up defense using a trust chain and improving overall platform security.

Attendees will learn about the changes to TSS to make use much easier and more efficient, and how to start developing applications and resources. Use cases including key storage and software measurement will be addressed, along with strong device identity and authentication. Using the TPM and TSS for health monitoring also will be discussed. Attendees also will learn about newly available software and resources for faster development.

Register here:

TCG has expanded its concept of trust and security from enterprise computing and networking to embedded, IoT, and network equipment security with new work groups and subgroups and a number of new specifications and guidance documents.

About TCG

TCG develops, defines and promotes open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information about TCG is available at Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

*** This is a Security Bloggers Network syndicated blog from Trusted Computing Group authored by TCG Admin. Read the original post at: