Trusted Computing Group
The quantum clock is ticking and businesses are still stuck in prep mode
Quantum computing is still years away from breaking current encryption, but many security teams are already worried about what happens when that moment arrives. A new report …
TPM 2.0: The new standard for secure firmware
Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM 2.0 specification from the Trusted Computing Group …
Mitigating the risks of artificial intelligence compromise
The number of cyberattacks directed at artificial intelligence (AI) continues to increase, and hackers are no longer planting malicious bugs within code – their …
Tackling supply chain security head-on
Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or …
TCG’s security guide verifies the trustworthiness of each end point
IT administrators and manufacturers can now secure enterprise computing, with the latest specification from the Trusted Computing Group (TCG). This new guide verifies the …
New batch of Trusted Computing Group certified products
Trusted Computing Group has recently certified four products, including a Trusted Platform Module (TPM) and three products supporting the group’s security automation …
Trusted Computing Group unveils new membership option
Open industry standards organization Trusted Computing Group announced it has created a new membership option, the Associate, targeted to enterprise users, service providers, …
How to build a trusted virtualized platform
Trusted Computing Group (TCG) released the first Virtualized Platform Architecture, which describes how to build a trusted virtualized platform. With this specification, …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades