Community


0

Viva La France - TCG Heads to Chip-to-Cloud Security Forum with Keynote, Presentations and Panels Sept. 24-26

by TCG in Action

In recent years, security has become less of a niche topic and much more horizontal across all aspects of computing.

News & Events

Read Post
0

Security is the New Black - A Look at Growing Support for Trusted Company

by TCG in Action

A recent article in Federal Technology Insider provided some interesting outtakes on the use of Trusted Computing by US federal agencies and related bodies. 

Data Protection

Read Post
0

How to Start Deploying Self-encrypting Drives? Simple Crypto-erase for Drive Retirement Is a Good First Step

by TCG in Action

Now that self-encrypting drives are becoming increasingly available and in some cases are the ONLY drive option for enterprise PCs, servers, and storage systems, where can IT and security professionals start and get immediate value with these powerful tools for data protection?

Data Protection

Read Post
0

TCG Publishes MAP Content Authorization Specification, Leveraging XACML to Protect Data

by TCG in Action

Earlier this year, TCG published for public review a new spec that helps protect potentially high-value data in MAP servers, based on TCG’s IF-MAP protocol - click here for details. Based on the feedback received from the public review and prototype implementation, the MAP Content Authorization spec is now official!

Data Protection, News & Events

Read Post
0

Yes, the Root of Trust Helps Secure Wireless Access Too

by TCG in Action

Here at TCG, we’ve been talking a lot lately about the benefits of the root of trust. That’s because at the foundation of computing, most of our devices, networks and applications are inherently untrustworthy. In our continued quest to connect everything from the office PC to the factory to home thermostats, we forgot that somewhere, somehow, we must ensure that private data and communications should be protected.

News & Events

Read Post
Older Entries