TCG Admin, Author at Security Boulevard

Securing the hardware supply chain

| | Blog
By Michael Mattioli, Co-Chair of TCG Supply Chain Security Work Group When we think about cyber threats, we often imagine someone sitting in a dark room, furiously typing as green text spreads across the screen in an attempt to exploit a software vulnerability, or misconfiguration, which may give them access ... Read More

Microsoft, Intel and Goldman Sachs to lead new TCG work group to tackle supply chain security challenges

| | Press Release
Beaverton, OR, USA, October 19, 2021 – Trusted Computing Group (TCG) has today announced a new work group that will define how TCG technologies can be implemented to address supply chain security challenges. Led by representatives from Microsoft, Intel, and Goldman Sachs, the work group will create guidance that defines, ... Read More

Cyber security in the skies – protecting satellites from attack

| | Blog
The resurgence of the satellite industry in recent years has led to entire constellations of satellites orbiting our skies. With the number of connected devices worldwide due to hit 50 billion by 2030, connectivity requirements are soaring, and the use of satellites is helping to meet this insatiable demand. From ... Read More

Trusted computing is key to preventing cyberattacks whilst working from home

| | Blog
Over the past 18 months, there has been a significant shift in the workplace due to the Covid-19 pandemic. More people than ever before started working from home, with many organizations forced to manage a dispersed workforce. Although we are now seeing some workers return to offices, this will not ... Read More
Securing supply chains – TCG’s answer to attacks

Securing supply chains – TCG’s answer to attacks

| | Blog
In 2020 alone, there was a shocking 430% increase in supply chain attacks, according to research by Sonatype. With this statistic in mind, it is clear that supply chains require better security, in order to protect them from the large rise in attacks we have witnessed. Why are supply chain ... Read More

TCG releases first security verification guide for enterprise systems with NIST

| | Press Release
Beaverton, OR, USA, May 19, 2021 – IT administrators and manufacturers can now secure enterprise computing, with the latest specification from the Trusted Computing Group (TCG). This new guide verifies the trustworthiness of each end point, by allowing the integrity of devices and networks within enterprise systems to be measured ... Read More

Providing a secure future for billions of IoT devices through cyber resilience

| | Industry News
The Internet of Things (IoT) is rapidly increasing in popularity, with predictions that there will be 27.1 billion devices this year, according to Cisco, making it imperative that cyber resilience becomes a priority to ensure a safe future for all, says Rob Spiger, vice president of Trusted Computing Group With enterprises and people ... Read More
Consider IoT TPM security to augment existing protection

Consider IoT TPM security to augment existing protection

| | Industry News
Any organization that needs hardware-level security and uses IoT should consider integrating Trusted Platform Modules with their devices and network to boost their security posture. For more than 20 years, Trusted Platform Modules (TPMs) have been used in the cybersecurity community — mainly in the PC world. A TPM is a specialized ... Read More

TCG welcomes new member Goldman Sachs as it focuses on FinTech security for the first time

| | Press Release
Beaverton, OR, USA, February 22, 2021 – Trusted Computing Group (TCG) has today announced its commitment to strengthening the financial services industry against attack, as worldwide banking institution, Goldman Sachs, joins TCG in the fight for cybersecurity. In a first for TCG, the organization will now expand its focus to ... Read More
Space jam: why the military is prioritizing cybersecurity for space

Space jam: why the military is prioritizing cybersecurity for space

| | Industry News
Trusted Computing Group marketing workgroup chair Thorsten Stremlau says that security must be designed into satellite systems, so a level of trust is established between earthbound devices and satellites. “Trusted computing technology ensures the trustworthiness of devices, device identity and security validity, such as through the use of cryptographic keys,” ... Read More