TCG Blog

Three major cyber-attacks of 2025

Date Published: March, 10, 2026

2025 was a brutal, challenging year for businesses in terms of cyberattacks. The year was marked by significant increases in the frequency, sophistication and financial impact of incidents, with the UK’s National Cyber Security Centre (NCSC) reporting a… READ MORE

What cybersecurity trends can we expect to see in 2026?

Date Published: February, 25, 2026

2025 saw a number of significant trends emerge: from the increasing use of Artificial Intelligence (AI) and deregulation of industries at government level to the widening skills shortage of IT professionals. This constant evolution of the computing eco… READ MORE

Celebrating member excellence at our annual awards ceremony

Date Published: January, 21, 2026

Across 2025, we saw a number of incredible achievements, innovations and contributions from the experts that make up the Trusted Computing Group (TCG). In recognition of these efforts, we held our annual awards ceremony in Philadelphia last October as par… READ MORE

How do TCG technologies protect blockchain users?

Date Published: November, 18, 2025

A blockchain is a distributed and decentralized digital ledger of transactions that is distributed across an entire network of computers. The data within the chain is grouped into blocks, and because each block contains the hash of the previous one, it cr… READ MORE

How do TCG technologies protect digital wallet users?

Date Published: November, 04, 2025

Across the globe, digital wallets – software-based systems residing on smartphones, smart watches and other devices – are now commonly used to store payment information, such as debit and credit cards, event tickets, vouchers and even cryptocurrencies… READ MORE

Using a TPM to bolster anti-cheat measures in gaming

Date Published: September, 30, 2025

When it comes to the use of Trusted Platform Modules (TPMs), the benefits for protecting devices such as computers and networks is well known. However, one novel update from the gaming world has served to highlight the end user benefits our standards can … READ MORE

Ensuring cyber resilience from the hardware up

Date Published: September, 16, 2025

Today’s security models are increasingly reliant on dedicated security processors to perform critical measurements within devices and systems. In many cases, a Trusted Platform Module (TPM) is integrated to handle these tasks, while securely storing the… READ MORE

How the TPM will protect computing devices over the next 25 years

Date Published: August, 27, 2025

In our last blog, we looked at the work done by our members to develop and popularize the Trusted Platform Module (TPM) since its inception. Now, we look to the current computing landscape, and how the standard has evolved to meet today’s threats. An… READ MORE

What is post quantum cryptography, and how is TCG implementing it?

Date Published: August, 13, 2025

In the future, there will soon be a time when someone builds a quantum device powerful enough that it can be used to break the most widely used forms of encryption still in use today. Known as Q-Day, this event will have severe implications on any sector … READ MORE

How the Reference Integrity Manifest (RIM) delivers secure firmware

Date Published: June, 24, 2025

When it comes to hacking attempts, it’s not just software and hardware attacks that are on the rise, but the firmware too. Bolstered by the growing reliance we have on devices and equipment, the foundational components embedded in devices have become an… READ MORE