Thursday, April 26, 2018
  • RSA App Exposes User Data Due to Common Developer Mistake
  • 3 Security Best Practices We Used to Build a Strong Foundation at Threat Stack
  • A Brief Evolution of Web Apps
  • Keeping Your WAF Relevant: Emergency Feed Pushes New Mitigations in Just Hours
  • RSA 2018: Not As Messy As Before?

Security Boulevard

The home of the Security Bloggers Network

  • News   |  
  • Community   |  
  • Chats   |  
  • Webinars   |  
  • Download   |  

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
Security Bloggers Network 

Home » Security Bloggers Network » TSS TCTI Specification

TSS TCTI Specification

by TCG Admin on February 12, 2018

The following TSS Work Group specification has been posted for public review.

This document is a preliminary draft. It is for use in comment only and is subject to change without notice. Any comments regarding this specification may be submitted to TCG Administration at admin@trustedcomputinggroup.org.

Revision Under Public Review:

  • TSS TCTI Specification Version 1.0 Revision 05

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to email this to a friend (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • More
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Share on Skype (Opens in new window)
  • Click to share on Google+ (Opens in new window)

Related

This is a Security Bloggers Network syndicated blog post authored by TCG Admin. Read the original post at: Trusted Computing Group

February 12, 2018February 12, 2018 TCG Admin Resource, security bloggers network, software
  • ← TCG TSS 2.0 Marshaling/Unmarshaling API Specification
  • InSecurity Podcast: Kip Boyle on Determining “Reasonable Cybersecurity” →

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Internet Explorer Zero-Day Exploit Reportedly Exploited in Targeted Attacks
When Scammers Fill the Tech Support Void
Get Ready for Another Critical Drupal Patch Related to Drupalgeddon2
Time is Running Out: How to Get Ready for GDPR
The Danger in Outsourcing Cybersecurity to Foreign-Based Firms
Satan ransomware adds EternalBlue exploit
Building a Consistent Employee Protection Program
A Guide to the Must-Have Security Tools for GDPR Compliance
How to protect your Android device from a ransomware attack | Avast
Next Generation Identity and Access Management

Upcoming Webinars

May 08

Security at the Speed of Software Development

May 8 @ 11:00 am - 12:00 pm

More Webinars

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

The Danger in Outsourcing Cybersecurity to Foreign-Based Firms
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) Threat Intelligence 

The Danger in Outsourcing Cybersecurity to Foreign-Based Firms

April 25, 2018 Andy Jordan | Yesterday 1
Time is Running Out: How to Get Ready for GDPR
Cybersecurity Governance, Risk & Compliance Industry Spotlight Security Boulevard (Original) 

Time is Running Out: How to Get Ready for GDPR

April 23, 2018 Rao Papolu | 3 days ago 0
Everything Must Go: Effective Data Removal When a Business Closes
Data Security Industry Spotlight Security Boulevard (Original) 

Everything Must Go: Effective Data Removal When a Business Closes

April 20, 2018 Russ Ernst | Apr 20 0

Top Stories

Police Shut Down Largest DDoS-for-Hire Marketplace
Cyberlaw Featured Network Security News Security Boulevard (Original) Spotlight Vulnerabilities 

Police Shut Down Largest DDoS-for-Hire Marketplace

April 25, 2018 Lucian Constantin | Yesterday 0
Get Ready for Another Critical Drupal Patch Related to Drupalgeddon2
DevOps Featured Network Security News Security Boulevard (Original) Spotlight Vulnerabilities 

Get Ready for Another Critical Drupal Patch Related to Drupalgeddon2

April 24, 2018 Lucian Constantin | 1 day ago 2
Internet Explorer Zero-Day Exploit Reportedly Exploited in Targeted Attacks
Endpoint Featured Malware News Security Boulevard (Original) Spotlight Vulnerabilities 

Internet Explorer Zero-Day Exploit Reportedly Exploited in Targeted Attacks

April 23, 2018 Lucian Constantin | 2 days ago 0

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2018 Mediaops Inc. All rights reserved.
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.