Google Releases Details on New Shielded VMs Cloud Security Tools

Google Releases Details on New Shielded VMs Cloud Security Tools

| | Industry News
Google has released more details on Shielded VMs, a suite of security tools and techniques that the company announced recently for protecting enterprise cloud workloads against malicious software and other cyber-threats at the hardware and firmware levels. The post Google Releases Details on New Shielded VMs Cloud Security Tools appeared ... Read More

OnBoard Security Publishes New Guidance for Secure Software and Use of TPM with TSS

| | Blog
TCG member OnBoard Security, which offers a Trusted Software Stack (TSS) for the TPM 2.0, has just published a useful paper on how to evaluate software security and how to develop and maintain more secure software. The paper also includes some case studies and best practices for using the TPM ... Read More
Securing Industrial IoT sensors, part 1: The TPM for network security

Securing Industrial IoT sensors, part 1: The TPM for network security

| | Industry News
At a Sensors Expo 2018 workshop in San Jose, CA, with Embedded Computing Design, Trusted Computing Group (TCG) work group members presented information about TCG’s TPM for network security, the DICE lightweight root of trust and the Trusted Software Stack. The post Securing Industrial IoT sensors, part 1: The TPM ... Read More
MUD: The Solution to Our Messy Enterprise IoT Security Problems?

MUD: The Solution to Our Messy Enterprise IoT Security Problems?

| | Industry News
The ‘Manufacturer Usage Description’ proposal from IETF offers a promising route for bolstering security across the industry. The post MUD: The Solution to Our Messy Enterprise IoT Security Problems? appeared first on Trusted Computing Group ... Read More

TCG Publishes New Whitepaper to Guide Use of Its Mobile and Trusted Network Communications (TNC) Specifications for Mobile Security

| | Blog
The Trusted Computing Group has released a new whitepaper describing how the combination of technologies developed in its mobile and Trusted Network Communications (TNC) workgroups can be combined to address challenges faced by mobile device, mobile network, and mobile service providers. While both the mobile and TNC workgroups have existed ... Read More
Breaking the Ice on DICE: scaling secure Internet of Things Identities

Breaking the Ice on DICE: scaling secure Internet of Things Identities

| | Industry News
In this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong ... Read More

TCG Talks to SecurityLedger.com about DICE in New Podcast

| | Blog
The growing number of embedded and Internet of Things devices means more attack surfaces and opportunities for mayhem. Many devices were developed with little or no security considerations, and traditional security approaches, including the TCG’s Trusted Platform Module (TPM), don’t work in what are typically very small things designed for ... Read More

Mocana Leverages TPM 2.0 for Secure Embedded and IOT Devices

| | Blog
On July 24, eWeek published a story about new support for TPM 2.0 from TCG member Mocana, http://www.eweek.com/security/mocana-embraces-tpm-2.0-for-iot-device-authentication-assurance. eWeek security journalist Sean Kerner (@SeanKerner) notes, “…Mocana is set to announce on July 25 that it is supporting the Trusted Platform Module (TPM) 2.0 standard to help improve the security of ... Read More
Mocana Embraces TPM 2.0 for IoT Device Authentication Assurance

Mocana Embraces TPM 2.0 for IoT Device Authentication Assurance

| | Industry News
With the addition of support for the Trusted Platform Module 2.0 specification, Mocana is looking to help improve security updates and container deployment in embedded, Internet of Things (IoT) devices. The post Mocana Embraces TPM 2.0 for IoT Device Authentication Assurance appeared first on Trusted Computing Group ... Read More

New TCG Architect’s Guide Demonstrates Fraud Reduction in Payment Industry with Trusted Computing

| | Blog
TCG and its work groups recently have spent much time examining the growing insecurity of payments via mobile/IoT devices and how core concepts of trusted computing can be applied to reduce fraud and better protect payments, which are quickly becoming a norm for many users and businesses. To help the ... Read More
Loading...