TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems

TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems

| | Industry News
Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems. The post TCG addresses the rapid pace of IoT security with new guidelines ... Read More
TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems

TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems

| | Industry News
Beaverton, OR, USA, February 10, 2020 – Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems. The post TCG addresses the rapid ... Read More

TCG addresses the rapid pace of IoT security with new guidelines for software updates on embedded systems

| | Press Release
Beaverton, OR, USA, February 10, 2020 – Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems. Firmware and software updates are of ... Read More

Discover how to strengthen supply chain trust with TCG at RSA Conference 2020

| | Blog, Uncategorized
Trusted Computing Group (TCG) has been invited to speak at the RSA Conference in San Francisco, CA from Feb 24 – 28. The speaker session, ‘Demonstration of tools for Supply Chain Risk Management’, will take place on February 27, at 8am and explore how industry standards can be utilized to ... Read More

Ensuring security in an ever-increasing data hungry world

| | Blog
By Jim Hatfield, Chair of the Storage Work Group in the Trusted Computing Group (TCG) The era of data-centric computing is here and fortunately data storage is more effective than ever. New applications and platforms are creating vast quantities of data which needs analysing, not just archiving. Big data applications ... Read More

Why you should work with your rivals to tackle cyber threats

| | Industry News
Sharing security knowledge with other companies is an effective weapon in the war against cyberattacks The threat from cyberattacks is growing. In the first nine months of 2019, there were more than 5,000 data breaches reported, leading to nearly eight billion records being exposed. According to Risk Based Security, which ... Read More
New embedded talents gather in Nuremberg

New embedded talents gather in Nuremberg

| | Industry News
TCG’s show preview for Embedded World 2020 Expo & Conference The post New embedded talents gather in Nuremberg appeared first on Trusted Computing Group ... Read More

Trusted Computing Group welcomes GlobalPlatform’s IoTopia in the development of IoT ecosystem security

| | Blog
By Steve Hanna, Co-Chair of the Internet of Things (IoT) Workgroup at TCG As the number of intelligent and connected Internet of Things (IoT) devices continues to grow, with many making use of sensitive data and gathering critical information, GlobalPlatform has launched IoTopia, a common framework for standardizing the design, ... Read More

Looking into the seeds of time – Part X

| | Industry News
Ahead of 2020, DW asked a whole host of individuals working in the tech space for their thoughts and observations on the business trends and technology developments likely to be major features of the year ahead. No one gave us the kitchen sink, but otherwise it seems that we’ve uncovered ... Read More

The dangers of IoT and AI

| | Industry News
The risks of cybersecurity are more complex than ever. Due to the rise of the Internet of Things (IoT) and Artificial Intelligence (AI), by 2020 every person will generate 1.7 megabytes of information per second. As new technologies evolve, cyber criminals adapt and discover new hacking methods to apprehend sensitive ... Read More