Trusted Computing Group http://trustedcomputinggroup.org/ Wed, 01 Apr 2026 02:39:56 +0000 en-US hourly 1 New TPM Course from TCG and OST2 Empowers Developers with Advanced Security Skills https://trustedcomputinggroup.org/new-tpm-course-from-tcg-and-ost2-empowers-developers-with-advanced-security-skills/ Tue, 31 Mar 2026 15:00:14 +0000 https://trustedcomputinggroup.org/?p=123367 Software developers and students will gain advanced knowledge in how to build secure systems using a Trusted Platform Module (TPM), thanks to a new technical security training program from the … Continue reading "New TPM Course from TCG and OST2 Empowers Developers with Advanced Security Skills"

The post New TPM Course from TCG and OST2 Empowers Developers with Advanced Security Skills appeared first on Trusted Computing Group.

]]>
New computing specification implements PQC measures to protect users from quantum attacks https://trustedcomputinggroup.org/new-computing-specification-implements-pqc-measures-to-protect-users-from-quantum-attacks/ Sun, 22 Mar 2026 18:59:57 +0000 https://trustedcomputinggroup.org/?p=123344 Device owners using the latest Trusted Platform Modules (TPMs) are now better equipped to protect their sensitive data from quantum attacks, thanks to a new specification from the Trusted Computing … Continue reading "New computing specification implements PQC measures to protect users from quantum attacks"

The post New computing specification implements PQC measures to protect users from quantum attacks appeared first on Trusted Computing Group.

]]>
Three major cyber-attacks of 2025 https://trustedcomputinggroup.org/three-major-cyber-attacks-of-2025/ Tue, 10 Mar 2026 14:21:17 +0000 https://trustedcomputinggroup.org/?p=123331 2025 was a brutal, challenging year for businesses in terms of cyberattacks. The year was marked by significant increases in the frequency, sophistication and financial impact of incidents, with the … Continue reading "Three major cyber-attacks of 2025"

The post Three major cyber-attacks of 2025 appeared first on Trusted Computing Group.

]]>
What cybersecurity trends can we expect to see in 2026? https://trustedcomputinggroup.org/what-cybersecurity-trends-can-we-expect-to-see-in-2026/ Wed, 25 Feb 2026 13:29:16 +0000 https://trustedcomputinggroup.org/?p=123315 2025 saw a number of significant trends emerge: from the increasing use of Artificial Intelligence (AI) and deregulation of industries at government level to the widening skills shortage of IT … Continue reading "What cybersecurity trends can we expect to see in 2026?"

The post What cybersecurity trends can we expect to see in 2026? appeared first on Trusted Computing Group.

]]>
2027年を見据え、日本にも必須のPQC・CRA対応の加速に向けて Trusted Computing Groupが都内でワークショップを開催 https://trustedcomputinggroup.org/workshop2026/ Wed, 28 Jan 2026 07:39:14 +0000 https://trustedcomputinggroup.org/?p=123154 日本の企業は毎週約1,000件のサイバー攻撃に直面しており、耐量子暗号(PQC)および人工知能(AI)のセキュリティに必要な技術の標準化を早急に進める必要があります。 Trusted Computing Group (TCG)日本支部 は、来る2月12日にヒルトン東京にて公開ワークショップを開催します。ワークショップでは、「Trusted Computing Group が標準化する2027 X-Day ~ AI・量子時代の新たな脅威に立ち向かう、次世代のサプライチェーン・セキュリティ~」をテーマに、日本のビジネスにとってのエンドツーエンドのサプライチェーン・セキュリティについて掘り下げていきます。さらに、次世代インフラを支えるレジリエンス(耐性)と相互運用性を備えたシステムの構築に向けた最適な手法についても議論します。 「2027年のX-Dayを見据える中、グローバルなセキュリティ基準を強化する緊急性は明らかです」と、TCGプレジデントのジョー・ペニシ氏は述べています。「AIとPQCが脅威の状況をかつてないスピードで変革する中、本ワークショップは、デジタルサプライチェーン全体のセキュリティ確保に必要な技術やルールを共有・整理する貴重な機会となります。」 2025年には、AIを活用した攻撃者が増加しており、日本国民に対する攻撃はより巧妙化していました。AI攻撃や量子攻撃の複雑さと件数が増大するにつれ、セキュリティ対策の標準化が極めて重要になります。なぜなら、個々の組織だけでは新たなリスクをすべて予見することはできず、また独自仕様の防御策は、しばしば企業のサプライチェーン全体の中で最も脆弱な部分となりがちだからです。ワークショップでは、これらの攻撃に対するレジリエンス(耐性)を確保するために利用可能な標準規格や対策について、他にはない有益なガイダンスを提供します。 加えて、本ワークショップでは、2027年に施行が予定されているサイバーレジリエンス法(CRA)への対応をめぐる緊急性の高まりを踏まえ、規制要件が進化し続ける中で、CRA対応に関する認知向上や理解の深化、準備体制の強化を通じて日本企業を支援するというTCGの継続的な使命を体現するものです。 TCG日本支部共同議長の永田 篤志氏、安藤 万理江氏は、「差し迫る PQC と CRA への対応では、要点を押さえつつ効率的に進めることが、日本のビジネスを強くしていくうえで非常に重要です。特に、独自仕様やカスタム仕様だけに頼るのではなく、世界の重要インフラとも接続しうる標準技術や認証フレームワーク、長期メンテナンスを見据えたエコシステムを活用していくことが鍵になります。このワークショップが、その重要性を共有し、具体的な取り組みを考える場になればと願っています。」と述べています。 本ワークショップは、TCGの東京での会員会議と並行して開催され、世界および地域の専門家が一堂に会し、トラステッドコンピューティングの将来と日本のセキュリティエコシステムについて議論します。講演者は、梅城 崇師氏(総務省 サイバーセキュリティ統括官室 企画官)による基調講演の他、安藤 万理江(STMicroelectronics および JRF 共同議長)、ジョー・ペニシ氏 (TCG プレジデント)、クリス・フェナー氏(Google および … Continue reading "2027年を見据え、日本にも必須のPQC・CRA対応の加速に向けて Trusted Computing Groupが都内でワークショップを開催"

The post 2027年を見据え、日本にも必須のPQC・CRA対応の加速に向けて Trusted Computing Groupが都内でワークショップを開催 appeared first on Trusted Computing Group.

]]>
Japan must accelerate PQC and CRA readiness before 2027, new JRF-TCG workshop urges https://trustedcomputinggroup.org/japan-must-accelerate-pqc-and-cra-readiness-before-2027-new-jrf-tcg-workshop-urges/ Wed, 28 Jan 2026 07:37:35 +0000 https://trustedcomputinggroup.org/?p=123152 With Japanese businesses facing approximately 1,000 cyberattacks per week, immediate action is required to standardize technologies essential for Post Quantum Cryptography (PQC) and Artificial Intelligence (AI) security, is the call … Continue reading "Japan must accelerate PQC and CRA readiness before 2027, new JRF-TCG workshop urges"

The post Japan must accelerate PQC and CRA readiness before 2027, new JRF-TCG workshop urges appeared first on Trusted Computing Group.

]]>
Celebrating member excellence at our annual awards ceremony https://trustedcomputinggroup.org/celebrating-member-excellence-at-our-annual-awards-ceremony/ Wed, 21 Jan 2026 16:30:32 +0000 https://trustedcomputinggroup.org/?p=123150 Across 2025, we saw a number of incredible achievements, innovations and contributions from the experts that make up the Trusted Computing Group (TCG). In recognition of these efforts, we held … Continue reading "Celebrating member excellence at our annual awards ceremony"

The post Celebrating member excellence at our annual awards ceremony appeared first on Trusted Computing Group.

]]>
91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey https://trustedcomputinggroup.org/91-of-businesses-do-not-have-a-roadmap-in-place-to-protect-against-quantum-threats-finds-new-industry-survey/ Tue, 02 Dec 2025 15:12:35 +0000 https://trustedcomputinggroup.org/?p=122944 Businesses in all industries are extremely vulnerable to quantum computing attacks, with a new report from the Trusted Computing Group (TCG) finding that 91% of security professionals within the USA … Continue reading "91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey"

The post 91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey appeared first on Trusted Computing Group.

]]>
How do TCG technologies protect blockchain users? https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-blockchain-users/ Tue, 18 Nov 2025 15:59:55 +0000 https://trustedcomputinggroup.org/?p=122917 A blockchain is a distributed and decentralized digital ledger of transactions that is distributed across an entire network of computers. The data within the chain is grouped into blocks, and … Continue reading "How do TCG technologies protect blockchain users?"

The post How do TCG technologies protect blockchain users? appeared first on Trusted Computing Group.

]]>
How do TCG technologies protect digital wallet users? https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-digital-wallet-users/ Tue, 04 Nov 2025 15:02:54 +0000 https://trustedcomputinggroup.org/?p=122867 Across the globe, digital wallets – software-based systems residing on smartphones, smart watches and other devices – are now commonly used to store payment information, such as debit and credit … Continue reading "How do TCG technologies protect digital wallet users?"

The post How do TCG technologies protect digital wallet users? appeared first on Trusted Computing Group.

]]>
Using a TPM to bolster anti-cheat measures in gaming https://trustedcomputinggroup.org/using-a-tpm-to-bolster-anti-cheat-measures-in-gaming/ Tue, 30 Sep 2025 14:18:56 +0000 https://trustedcomputinggroup.org/?p=122792 When it comes to the use of Trusted Platform Modules (TPMs), the benefits for protecting devices such as computers and networks is well known. However, one novel update from the … Continue reading "Using a TPM to bolster anti-cheat measures in gaming"

The post Using a TPM to bolster anti-cheat measures in gaming appeared first on Trusted Computing Group.

]]>
SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon https://www.secedge.com/news/secedge-joins-tcg-approved-vendors-with-sec-tpm-a-groundbreaking-tpm-2-0-solution-for-arm-trustzone-enabled-silicon/#new_tab Tue, 30 Sep 2025 01:34:36 +0000 https://trustedcomputinggroup.org/?p=122788 SEC-TPM™ stands as an industry first, pioneering security in Edge AI and enhancing application data privacy for confidential computing AI security and data privacy have received a major boost today … Continue reading "SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon"

The post SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon appeared first on Trusted Computing Group.

]]>
TCG and OST2 Expands Curriculum for Developing Cybersecurity Experts in Trusted Computing https://trustedcomputinggroup.org/tcg-and-ost2-expands-curriculum-for-developing-cybersecurity-experts-in-trusted-computing/ Tue, 23 Sep 2025 04:17:11 +0000 https://trustedcomputinggroup.org/?p=122776 Software developers and students interested in device security will be given the chance to enhance their cybersecurity skills and the security of devices through a new technical security training program … Continue reading "TCG and OST2 Expands Curriculum for Developing Cybersecurity Experts in Trusted Computing"

The post TCG and OST2 Expands Curriculum for Developing Cybersecurity Experts in Trusted Computing appeared first on Trusted Computing Group.

]]>
Ensuring cyber resilience from the hardware up https://trustedcomputinggroup.org/ensuring-cyber-resilience-from-the-hardware-up/ Wed, 17 Sep 2025 04:11:29 +0000 https://trustedcomputinggroup.org/?p=122774 Today’s security models are increasingly reliant on dedicated security processors to perform critical measurements within devices and systems. In many cases, a Trusted Platform Module (TPM) is integrated to handle … Continue reading "Ensuring cyber resilience from the hardware up"

The post Ensuring cyber resilience from the hardware up appeared first on Trusted Computing Group.

]]>
How the TPM will protect computing devices over the next 25 years https://trustedcomputinggroup.org/how-the-tpm-will-protect-computing-devices-over-the-next-25-years/ Wed, 27 Aug 2025 15:09:30 +0000 https://trustedcomputinggroup.org/?p=122730 In our last blog, we looked at the work done by our members to develop and popularize the Trusted Platform Module (TPM) since its inception. Now, we look to the … Continue reading "How the TPM will protect computing devices over the next 25 years"

The post How the TPM will protect computing devices over the next 25 years appeared first on Trusted Computing Group.

]]>
What is post quantum cryptography, and how is TCG implementing it? https://trustedcomputinggroup.org/what-is-post-quantum-cryptography-and-how-is-tcg-implementing-it/ Thu, 14 Aug 2025 02:43:12 +0000 https://trustedcomputinggroup.org/?p=122710 In the future, there will soon be a time when someone builds a quantum device powerful enough that it can be used to break the most widely used forms of … Continue reading "What is post quantum cryptography, and how is TCG implementing it?"

The post What is post quantum cryptography, and how is TCG implementing it? appeared first on Trusted Computing Group.

]]>
How the Reference Integrity Manifest (RIM) delivers secure firmware https://trustedcomputinggroup.org/how-the-reference-integrity-manifest-rim-delivers-secure-firmware/ Tue, 24 Jun 2025 14:03:27 +0000 https://trustedcomputinggroup.org/?p=122615 When it comes to hacking attempts, it’s not just software and hardware attacks that are on the rise, but the firmware too. Bolstered by the growing reliance we have on … Continue reading "How the Reference Integrity Manifest (RIM) delivers secure firmware"

The post How the Reference Integrity Manifest (RIM) delivers secure firmware appeared first on Trusted Computing Group.

]]>
Reflecting on the TPM: over 25 years of computing security https://trustedcomputinggroup.org/reflecting-on-the-tpm-over-25-years-of-computing-security/ Mon, 09 Jun 2025 14:10:29 +0000 https://trustedcomputinggroup.org/?p=122618 In our latest blog covering the 25th anniversary of the TPM, we hear from TCG legends Dave Grawrock, Steve Hanna, Monty Wiseman and Dave Challener on the development of the … Continue reading "Reflecting on the TPM: over 25 years of computing security"

The post Reflecting on the TPM: over 25 years of computing security appeared first on Trusted Computing Group.

]]>
Securing Edge AI through trusted computing https://trustedcomputinggroup.org/securing-edge-ai-through-trusted-computing/ Thu, 22 May 2025 05:51:02 +0000 https://trustedcomputinggroup.org/?p=122560 In today’s computing landscape, edge computing has proven to be a highly viable and low-latency option for real-time operations. By leveraging local compute devices – such as IoT nodes, small … Continue reading "Securing Edge AI through trusted computing"

The post Securing Edge AI through trusted computing appeared first on Trusted Computing Group.

]]>
TCG welcomes Arm as new board member to make trusted computing a core pillar of system architecture https://trustedcomputinggroup.org/tcg-welcomes-arm-as-new-board-member-to-make-trusted-computing-a-core-pillar-of-system-architecture/ Tue, 06 May 2025 21:33:51 +0000 https://trustedcomputinggroup.org/?p=122539 The Trusted Computing Group (TCG) has announced Arm has today joined the Board of Directors, with Dong Wei appointed as its representative. The ubiquitous Arm compute platform touches 100 percent … Continue reading "TCG welcomes Arm as new board member to make trusted computing a core pillar of system architecture"

The post TCG welcomes Arm as new board member to make trusted computing a core pillar of system architecture appeared first on Trusted Computing Group.

]]>