Syndicated Blog

Trusted Computing Group
The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across m

Taking Industrial Cybersecurity Seriously

| | Industry News
On page 15 of World Pipelines magazine, Steve Hanna, Co-Chair of the industrial Work Group at TCG, describes how to protect the digital future of pipeline operations. The post Taking Industrial Cybersecurity ...

Protecting the energy sector’s industrial IoT

| | Blog
By Steve Hanna, Co-chair of TCG’s Industrial Work Group and IoT Work Group Many sectors now utilize Internet of Things (IoT) equipment to drive digital transformation, and ultimately increase automation and efficiency ...

5 security lessons to learn in 2022

| | Blog
As we look ahead to what is next for 5G deployments, the mass adoption of Virtual Reality, and the increasing digital transformation of all industries, new cybersecurity challenges are on the horizon ...

How to Reduce The Risk of Cyber-Attacks on Global Supply Chains

| | Industry News
Trusted-Computing-Group-article-USCM-winter-2022-Issue The number of cyber-attacks attempting to compromise global industry supply chains are on the rise, and a new survey by BlueVoyant found that 97 percent of global firms have been impacted ...

Tackling the rise of cyber-attacks on Industrial Control Systems

| | Blog
By Steve Hanna, Chair of Industrial Work Group Cyber-attacks on Industrial Control Systems are increasing, requiring the designers of industrial systems to reassess and re-evaluate their methods of guarding against not only ...

The Cyber Skills Shortage & Training Gap – What Is The Solution?

| | Industry News
With large-scale data breaches increasing in not only frequency but also complexity, increasing cyber security resiliency should be a top priority for all industries. According to the International System Security Certification Consortium (ICS2) there are more ...

Protecting Supply Chains from Highly Contagious Attacks

| | Industry News
Hackers are using supply chain attacks to infiltrate a large number of organizations using a single, targeted attack. According to a report from the security company, Anchore, 64% of respondents have been impacted ...

DMTF Shares Industry Support for its Platform Security Standards

| | Press Release
PORTLAND, Ore. – January 11, 2022 – DMTF today announced that its Security Protocol and Data Model (SPDM) specifications have garnered industry support and are actively helping to solve customer and end ...

Securing Supply Chains Against the Threat of Attacks

| | Industry News
It is clear to see that supply chain attacks are on the rise. Recent research shows that the US saw a rise of 42% in the first quarter of 2021 alone, and supply chain ...
June 2021 Member Meeting | Google R&D Session

TPM as an API for attestation in big, distributed environments

| | Blog
By Chris Fenner & Jeff Andersen, Google Google’s data center platforms currently lean on proprietary Titan hardware and APIs to attest to platform integrity. These APIs provide advanced features like first-instruction integrity ...

Secure Guardrails