Most trusted computing group tnc related news are at:
TPM Security Overview: Defining the Benefits of TPM Devices 26 Aug 2013 | 05:00 am
By Michael Cobb, Application Security Information security is awash with a variety of attacks aimed at everything from Web browsers to authentication processes to Adobe software. Defending such a lar...
The Pressing Need to Improve Endpoint Visibility for Information Security 26 Aug 2013 | 05:00 am
Author: Jon Oltsik In a recent ESG research project, 315 security professionals working at enterprise organizations (i.e., more than 1,000 employees) were asked to identify their organizations’ endpo...
More trusted computing group tnc related news:
TCG Members to Talk Security Implementation and Evolution at Trusted Computing Conference trustedcomputinggroup.org 26 Aug 2013 | 05:00 am
PORTLAND, Ore., Aug. 26, 2013 - Trusted Computing Group (TCG) members will provide attendees of the Trusted Computing Conference, Sept. 9-12, with a look at the billions of trusted endpoints and fresh...
Trusted Computing Group Comments on Trusted Platform Module Security Following Black Hat Presentation trustedcomputinggroup.org 31 Jul 2013 | 05:00 am
PORTLAND, Ore., August 1, 2013 – Trusted Computing Group (TCG) today commented on a presentation from MITRE Corp. given July 31, 2013 at the Black Hat Conference. The presentation by John Butterwo...
Trusted Computing Group Members to Talk Standards-Based Data Protection, Security at Flash Memory Summit trustedcomputinggroup.org 29 Jul 2013 | 05:00 am
What: Members of the Trusted Computing Group will participate in sessions at the August 13-15 Flash Memory Summit. In the Security track, organized by Michael Willett o...