Trustedcomputinggroup - trustedcomputinggroup.org - Trusted Computing Group News
General Information:
Latest News:
TPM Security Overview: Defining the Benefits of TPM Devices 26 Aug 2013 | 05:00 am
By Michael Cobb, Application Security Information security is awash with a variety of attacks aimed at everything from Web browsers to authentication processes to Adobe software. Defending such a lar...
The Pressing Need to Improve Endpoint Visibility for Information Security 26 Aug 2013 | 05:00 am
Author: Jon Oltsik In a recent ESG research project, 315 security professionals working at enterprise organizations (i.e., more than 1,000 employees) were asked to identify their organizations’ endpo...
TCG Members to Talk Security Implementation and Evolution at Trusted Computing Conference 26 Aug 2013 | 05:00 am
PORTLAND, Ore., Aug. 26, 2013 - Trusted Computing Group (TCG) members will provide attendees of the Trusted Computing Conference, Sept. 9-12, with a look at the billions of trusted endpoints and fresh...
Trusted Computing Group Comments on Trusted Platform Module Security Following Black Hat Presentation 31 Jul 2013 | 05:00 am
PORTLAND, Ore., August 1, 2013 – Trusted Computing Group (TCG) today commented on a presentation from MITRE Corp. given July 31, 2013 at the Black Hat Conference. The presentation by John Butterwo...
Trusted Computing Group Members to Talk Standards-Based Data Protection, Security at Flash Memory Summit 29 Jul 2013 | 05:00 am
What: Members of the Trusted Computing Group will participate in sessions at the August 13-15 Flash Memory Summit. In the Security track, organized by Michael Willett o...
Hardware Encryption Market Worth $166.67 Billion by 2018 22 Jul 2013 | 05:00 am
According to the new market research report "Hardware Encryption Market - By Algorithms (AES, RSA), Architectures (FPGA, ASIC), Products (Hard Disk Drives, USB Drives and In-Line Encryptors), Applicat...
Implementing Hardware Roots of Trust: A New Guide to Hardware Security Developed by the SANS Institute 24 Jun 2013 | 05:00 am
Learn How to Implement a Ubiquitous Technology Already Embedded in Enterprise Endpoints Bethesda, MD – June 24, 2013 – SANS Institute has developed a first-of-its-kind guide to update organizations o...
Implementing Hardware Roots of Trust: A New Guide to Hardware Security Developed by the SANS Institute 24 Jun 2013 | 05:00 am
Learn How to Implement a Ubiquitous Technology Already Embedded in Enterprise Endpoints BETHESDA, Md., June 24, 2013 /PRNewswire-USNewswire/ -- SANS Institute has developed a first-of-its-kind gu...
Security ROI: 5 practices analyzed 21 Jun 2013 | 05:00 am
Traditionally, enterprise data security has relied on a "fortress defense" approach: keep all assets within a corporate castle and build towering walls to keep out the enemy. However, with an evolving...
Security ROI: 5 practices analyzed 21 Jun 2013 | 05:00 am
Traditionally, enterprise data security has relied on a "fortress defense" approach: keep all assets within a corporate castle and build towering walls to keep out the enemy. However, with an evolving...