Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.
The information your computing device contains today is more important than the actual device itself, so it is important to protect it from unauthorized access. While there are several third-party apps to help you with this, Windows has its own built-in encryption tool, BitLocker. BitLocker works [...]
With a cyberattack occurring every 39 seconds, not only are they becoming more frequent, they are becoming more sophisticated and premeditated. Attackers have begun targeting supply chains, which is especially worrying as one attack can create a chain reaction and compromise a network of providers. [...]
A new era of computing requires a new kind of cryptography. Cybersecurity has become one of the hottest topics in the modern digital world. How to make cybersecurity solutions trustworthy is a highly relevant question. Cybersecurity solutions make use of cryptographic mechanisms, so trusting in t [...]
Software developers and students will gain advanced knowledge in how to build secure systems using a Trusted Platform Module (TPM), thanks to a new technical security training program from the Trusted Computing Group (TCG) and OpenSecurityTraining2 (OST2). The ‘Trusted Computing 1103: Advanced [...]
Device owners using the latest Trusted Platform Modules (TPMs) are now better equipped to protect their sensitive data from quantum attacks, thanks to a new specification from the Trusted Computing Group (TCG). The new Trusted Platform Module 2.0 v185 specification includes support for two post q [...]
日本の企業は毎週約1,000件のサイバー攻撃に直面しており、耐量子暗号(PQC)および人工知能(AI)のセキュリティに必要な技術の標準化を早急に進める必要があります。 Trusted Computing Group (TCG)日本支部 は、来る2月12日に� [...]
Introduction The rise of fully autonomous vehicles may soon render car ownership obsolete, as ride-sharing companies like Uber embrace the concept of driverless cars. To survive, automotive manufacturers must develop business models that allow feature activation to be tied both to the user as wel [...]
SEC-TPM™ stands as an industry first, pioneering security in Edge AI and enhancing application data privacy for confidential computing AI security and data privacy have received a major boost today as SecEdge joined the Trusted Computing Group (TCG) approved vendor com [...]
STMicroelectronics today announced the FIPS 140-3 certification of STSAFE-TPM trusted platform modules (TPMs), the first standardized cryptographic modules on the market to receive this certificate. The newly certified TPMs, the ST33KTPM2X, ST33KTPM2XSPI, ST33KTPM2XI2C, ST33KTPM2I and ST33KTPM2A [...]
A company of NEC, Cyber Defense Institute (CDI), a Japanese Cyber Security Company, launches the cloud-based private certification authority solution PIV Gateway™ CA that supports not only traditional X.509 certificate issuance but also emphasizes the issuance of Platform Certificates. Accordin [...]