Securing devices for a challenge of a lifetime

| | Blog
In light of the current global situation, technology is replacing a number of real-life activities to help us through the unprecedented measures that have been put in place in response to the global COVID-19 pandemic. As those transform their usual workplace office spaces into their kitchens, bedrooms and spare rooms, ... Read More

Marrying satellite with security innovation: Published on page 14-16 of Satellite Evolution Magazine

| | Industry News
Cybersecurity is not limited to the computer domain alone; more so now than ever before, cybersecurity has become a pressing topic for much of the satellite sector,in particular, satellite operators and defense sector users. On board cybersecurity innovations much be married with terrestrial technologies to create a truly secure ecosystem ... Read More

TCG propels security for embedded, automotive and IoT systems with complete TPM 2.0 Software Stack

| | Press Release
Beaverton, OR, USA, June 23, 2020 – Security for millions of devices across worldwide markets has been enhanced today as the Trusted Computing Group (TCG) releases its latest specification for the latest Trusted Platform Module (TPM 2.0) technology: the Feature Application Programming Interface (FAPI) standard. The secure operation of devices ... Read More
IoT Architects Guide: Published on page 28 of the IoT 2020 Design Guide

IoT Architects Guide: Published on page 28 of the IoT 2020 Design Guide

| | Industry News
The explosion of intelligent connected devices, or the Internet of Things (IoT), presents a massive expansion of the “attack surface“ hackers can target. Some researchers predict the IoT will reach 50 billion connected devices by the end of 2020. Many of these devices are vulnerable to attacks and the level ... Read More

A talk with the Trusted Computing Group on Cybersecurity

| | Industry News
When it comes to electronic systems and their protection, it’s almost surprising that it took so long before seeing significant industry-wide efforts to ensure safety, privacy, and security at the hardware level. This is not to say that there weren’t very good solutions available to those who took the effort, ... Read More

TCG addresses the rise in cybersecurity threats with critical new features to its TPM 2.0 specification

| | Press Release
Cybersecurity is taking a huge stride forward, as the Trusted Computing Group (TCG) today released its TPM 2.0 Library specification Revision 1.59 – providing necessary updates to the previously published TPM specification to combat the growing sophistication of cybersecurity threats worldwide. The challenges facing the cybersecurity industry are unprecedented, with ... Read More

No One Else’s Business: Crucial Steps in Achieving Effective Organizational Trusted Computing

| | Industry News
The dawn of 5G and the Internet of Things (IoT) era is rapidly approaching, facilitating the design and development of innovative devices with greater capabilities. COVID-19 is further driving this industry at a tremendous pace as companies seek more agility through digital transformation. With anticipation building for this new network ... Read More

Ensuring cybersecurity resilience in an ultra-connected world

| | Industry News
The development of the Internet of Things (IoT), Artificial Intelligence (AI), the cloud and big data have enabled devices that started out as unbelievable concepts to become a reality. From a consumer standpoint, these ever-increasing trends are often taken for granted as people become accustomed to smart devices becoming more ... Read More
Trust and Transparency in the Hardware Supply Chain

Trust and Transparency in the Hardware Supply Chain

| | Industry News
Organizations invest a lot of resources and effort to secure and protect their devices and IT environment, but there is growing concern over the parts that make up the equipment. The supply chain exposes organizations to risk because counterfeit parts may create safety hazards, cause the failure of critical business ... Read More

The importance of placing in the Race to Root

| | Blog, Uncategorized
In its free-to-attend BrightTalk webcast, Trusted Computing Group’s (TCG) Marketing Work Group Chair Thorsten Stemlau and Dennis Mattoon, Principle Software Development Engineer for Microsoft Research, stressed the importance of hardware security. Sharing their expert insight, they explored the integral role that Root of Trust (RoT) has to play in keeping ... Read More