TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems
Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems. The post TCG addresses the rapid pace of IoT security with new guidelines ... Read More
TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems
Beaverton, OR, USA, February 10, 2020 – Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems. The post TCG addresses the rapid ... Read More
TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems
Beaverton, OR, USA, February 10, 2020 – Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems. Firmware and software updates are of ... Read More
Discover how to strengthen supply chain trust with TCG at RSA Conference 2020
Trusted Computing Group (TCG) has been invited to speak at the RSA Conference in San Francisco, CA from Feb 24 – 28. The speaker session, ‘Demonstration of tools for Supply Chain Risk Management’, will take place on February 27, at 8am and explore how industry standards can be utilized to ... Read More
Ensuring security in an ever-increasing data hungry world
By Jim Hatfield, Chair of the Storage Work Group in the Trusted Computing Group (TCG) The era of data-centric computing is here and fortunately data storage is more effective than ever. New applications and platforms are creating vast quantities of data which needs analysing, not just archiving. Big data applications ... Read More
Why you should work with your rivals to tackle cyber threats
Sharing security knowledge with other companies is an effective weapon in the war against cyberattacks The threat from cyberattacks is growing. In the first nine months of 2019, there were more than 5,000 data breaches reported, leading to nearly eight billion records being exposed. According to Risk Based Security, which ... Read More
New embedded talents gather in Nuremberg
TCG’s show preview for Embedded World 2020 Expo & Conference The post New embedded talents gather in Nuremberg appeared first on Trusted Computing Group ... Read More
Trusted Computing Group welcomes GlobalPlatform’s IoTopia in the development of IoT ecosystem security
By Steve Hanna, Co-Chair of the Internet of Things (IoT) Workgroup at TCG As the number of intelligent and connected Internet of Things (IoT) devices continues to grow, with many making use of sensitive data and gathering critical information, GlobalPlatform has launched IoTopia, a common framework for standardizing the design, ... Read More
Looking into the seeds of time – Part X
Ahead of 2020, DW asked a whole host of individuals working in the tech space for their thoughts and observations on the business trends and technology developments likely to be major features of the year ahead. No one gave us the kitchen sink, but otherwise it seems that we’ve uncovered ... Read More
The dangers of IoT and AI
The risks of cybersecurity are more complex than ever. Due to the rise of the Internet of Things (IoT) and Artificial Intelligence (AI), by 2020 every person will generate 1.7 megabytes of information per second. As new technologies evolve, cyber criminals adapt and discover new hacking methods to apprehend sensitive ... Read More
