Trusted Computing Group 2016-12-02T16:39:40Z http://www.trustedcomputinggroup.org/feed/atom/ TCG Admin <![CDATA[STMicro Releases New Security Modules with TPM 2.0]]> http://www.trustedcomputinggroup.org/?p=20697 2016-12-02T16:39:40Z 2016-12-02T01:26:56Z Long-time TCG member STMicroelectronics has long implemented the TCG TPM specifications. This week, it announced a new product line. From their site (http://www.st.com/content/st_com/en/about/media-center/press-item.html/p3859.html): “…STMicroelectronics…has introduced two state-of-the-art security modules that provide an industry-validated shield to protect computers and smart connected devices against cyber-attacks. The new STSAFE Trusted Platform Modules (TPM) store system-authentication data such as cryptographic keys … Continue reading "STMicro Releases New Security Modules with TPM 2.0"

The post STMicro Releases New Security Modules with TPM 2.0 appeared first on Trusted Computing Group.

]]>
1
TCG Admin <![CDATA[STMicroelectronics Boosts Trusted Computing with New Advanced Security Modules]]> http://www.trustedcomputinggroup.org/?p=20691 2016-12-02T01:19:49Z 2016-12-02T01:18:06Z    Expansion of STSAFE family with latest Trusted Platform Modules (TPMs) extends support for state-of-the-art hardware-based online security Largest on-chip memory in the market provides greater storage for sensitive data Devices are certified to highest security-industry standards and supported by independent Certification Authority (CA)   Geneva / 23 Nov 2016 STMicroelectronics (NYSE: STM), a global … Continue reading "STMicroelectronics Boosts Trusted Computing with New Advanced Security Modules"

The post STMicroelectronics Boosts Trusted Computing with New Advanced Security Modules appeared first on Trusted Computing Group.

]]>
1
TCG Admin <![CDATA[Trusted Computing Group to Discuss and Demonstrate Security of the Internet of Things at ESC Silicon Valley 2016]]> http://www.trustedcomputinggroup.org/?p=20677 2016-12-02T00:53:35Z 2016-12-02T00:53:35Z PORTLAND, Ore., Dec. 2, 2016 – Trusted Computing Group and its members will demonstrate securing the Internet of Things with foundational trust at the Dec. 6-8, 2016 Embedded Systems Conference (ESC) Silicon Valley, San Jose, Calif. In Booth 1820, Mocana will show implementation of TPM security specifications in a small form-factor computing system with Mocana … Continue reading "Trusted Computing Group to Discuss and Demonstrate Security of the Internet of Things at ESC Silicon Valley 2016"

The post Trusted Computing Group to Discuss and Demonstrate Security of the Internet of Things at ESC Silicon Valley 2016 appeared first on Trusted Computing Group.

]]>
1
TCG Admin <![CDATA[Security Innovation Engineer Receives Prestigious TCG Key Contributor Award]]> http://www.trustedcomputinggroup.org/?p=20675 2016-12-02T00:50:06Z 2016-11-28T19:00:34Z FOR IMMEDIATE RELEASE Rebecca Leitch Marketing Communications Manager Security Innovation 978-267-1631 rleitch@securityinnovation.com www.securityinnovation.com https://www.securityinnovation.com/company/news-and-events/press-releases/security-innovation-engineer-receives-prestigious-tcg-key-contributor-award Security Innovation Engineer Receives Prestigious TCG Key Contributor Award Wilmington, MA – November 28, 2016 – The Trusted Computing Group (TCG) and its members have awarded Security Innovation Business Development Engineer Lee Wilson a 2016 Key Contributor Award. This award is … Continue reading "Security Innovation Engineer Receives Prestigious TCG Key Contributor Award"

The post Security Innovation Engineer Receives Prestigious TCG Key Contributor Award appeared first on Trusted Computing Group.

]]>
TCG Admin <![CDATA[Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs]]> http://www.trustedcomputinggroup.org/?p=20396 2016-11-18T23:50:22Z 2016-11-18T23:50:22Z TCG and its members created a non-proprietary way to ensure data on storage devices, such as hard disk drives or solid state (flash) drives. The industry specifications for self-encrypting drives (http://www.trustedcomputinggroup.org/work-groups/storage/). SEDs, available from all major drive makers and many others, now are embedded into almost all new drives and enterprise storage systems. These drives … Continue reading "Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs"

The post Save the Data, or Making It Simple to Make Sure Data Is Protected with SEDs appeared first on Trusted Computing Group.

]]>
1
TCG Admin <![CDATA[Webcast: Save the Data: How to Protect Data Wherever It Lives]]> http://www.trustedcomputinggroup.org/?p=20394 2016-11-18T23:46:21Z 2016-11-18T23:46:21Z Data has exploded across devices and anything with memory. No matter where it lives and whatever it is – sensitive personal, medical, financial, business data, photos and music – all such data is highly vulnerable, In fact, breaches occur daily and the growing number of interconnected “things” means that even more data is open to … Continue reading "Webcast: Save the Data: How to Protect Data Wherever It Lives"

The post Webcast: Save the Data: How to Protect Data Wherever It Lives appeared first on Trusted Computing Group.

]]>
3
TCG Admin <![CDATA[Save the Data: Trusted Computing Group to Host Data Protection Webcast November 16]]> http://www.trustedcomputinggroup.org/?p=20149 2016-11-03T19:47:04Z 2016-11-03T19:47:04Z PORTLAND, ORE. Nov. 3, 2016 — Trusted Computing Group (TCG) and member Michael Willett, Drive Trust Alliance, will address how to protect data, no matter where it lives, in a 60-minute webcast November 16.             Data has exploded across devices and things. No matter where it lives, and whether it is sensitive personal, medical or … Continue reading "Save the Data: Trusted Computing Group to Host Data Protection Webcast November 16"

The post Save the Data: Trusted Computing Group to Host Data Protection Webcast November 16 appeared first on Trusted Computing Group.

]]>
TCG Admin <![CDATA[The Internet of Things is broken. We need better security to fix it]]> http://www.trustedcomputinggroup.org/?p=20124 2016-11-02T23:07:07Z 2016-11-02T23:07:07Z A hot topic in both business and technology circles, the Internet of Things defines a range of technologies that allow us to potentially connect anything electronic with each other in a network of machines, appliance, devices and sensors.

The post The Internet of Things is broken. We need better security to fix it appeared first on Trusted Computing Group.

]]>
TCG Admin <![CDATA[Firmware compromise a major attack vector]]> http://www.trustedcomputinggroup.org/?p=20122 2016-11-02T23:05:45Z 2016-11-02T23:05:45Z Cyber-criminals have been very resourceful in gaining a foothold in enterprise networks. They have added firmware attacks on computing and network connected devices to their compromise tools, including highly socially engineered spear-phishing, infected USBs, compromised credentials, BYOD incursions and drive-by shooting from compromised websites.

The post Firmware compromise a major attack vector appeared first on Trusted Computing Group.

]]>
TCG Admin <![CDATA[Google’s All New Smart WiFi Router OnHub: Yay or Nay?]]> http://www.trustedcomputinggroup.org/?p=20120 2016-11-02T23:05:05Z 2016-11-02T23:02:30Z Google just announced its second wireless router for the home as part of its big hardware event – the Google smart WiFi Router called OnHub. What are its upside and downside?

The post Google’s All New Smart WiFi Router OnHub: Yay or Nay? appeared first on Trusted Computing Group.

]]>