Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

A detailed guide to BitLocker for Windows 11 users

The information your computing device contains today is more important than the actual device itself, so it is important to protect it from unauthorized access. While there are several third-party apps to help you with this, Windows has its own built-in encryption tool, BitLocker. BitLocker works [...]

Protecting the Healthcare Sector from Supply Chain Security Attacks

With a cyberattack occurring every 39 seconds, not only are they becoming more frequent, they are becoming more sophisticated and premeditated. Attackers have begun targeting supply chains, which is especially worrying as one attack can create a chain reaction and compromise a network of providers. [...]

Cybersecurity in the quantum age

A new era of computing requires a new kind of cryptography. Cybersecurity has become one of the hottest topics in the modern digital world. How to make cybersecurity solutions trustworthy is a highly relevant question. Cybersecurity solutions make use of cryptographic mechanisms, so trusting in t [...]

See More

TCG News Releases

New TPM Course from TCG and OST2 Empowers Developers with Advanced Security Skills

Software developers and students will gain advanced knowledge in how to build secure systems using a Trusted Platform Module (TPM), thanks to a new technical security training program from the Trusted Computing Group (TCG) and OpenSecurityTraining2 (OST2). The ‘Trusted Computing 1103: Advanced [...]

New computing specification implements PQC measures to protect users from quantum attacks

Device owners using the latest Trusted Platform Modules (TPMs) are now better equipped to protect their sensitive data from quantum attacks, thanks to a new specification from the Trusted Computing Group (TCG). The new Trusted Platform Module 2.0 v185 specification includes support for two post q [...]

2027年を見据え、日本にも必須のPQC・CRA対応の加速に向けて Trusted Computing Groupが都内でワークショップを開催

日本の企業は毎週約1,000件のサイバー攻撃に直面しており、耐量子暗号(PQC)および人工知能(AI)のセキュリティに必要な技術の標準化を早急に進める必要があります。 Trusted Computing Group (TCG)日本支部 は、来る2月12日に� [...]

See More

Whitepapers & Guides

Overcoming threats to Vehicle Security with Secure Role and Rights Management

Introduction The rise of fully autonomous vehicles may soon render car ownership obsolete, as ride-sharing companies like Uber embrace the concept of driverless cars. To survive, automotive manufacturers must develop business models that allow feature activation to be tied both to the user as wel [...]

See More

Member News Releases

SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon

SEC-TPM™ stands as an industry first, pioneering security in Edge AI and enhancing application data privacy for confidential computing AI security and data privacy have received a major boost today as SecEdge joined the Trusted Computing Group (TCG) approved vendor com [...]

STMicroelectronics delivers industry’s first FIPS 140-3 certified TPMs for computer, server, and embedded systems

STMicroelectronics today announced the FIPS 140-3 certification of STSAFE-TPM trusted platform modules (TPMs), the first standardized cryptographic modules on the market to receive this certificate. The newly certified TPMs, the ST33KTPM2X, ST33KTPM2XSPI, ST33KTPM2XI2C, ST33KTPM2I and ST33KTPM2A [...]

World’s First Commercial Certification Authority Supporting the Issuance of Platform Certificates

A company of NEC, Cyber Defense Institute (CDI), a Japanese Cyber Security Company, launches the cloud-based private certification authority solution PIV Gateway™ CA that supports not only traditional X.509 certificate issuance but also emphasizes the issuance of Platform Certificates. Accordin [...]

See More

Images & Graphics

See More