Search Resources



Search Results

Cars Are Rolling Application Platforms - and They Need Lots of Storage

Post Type: Post    Date added: July 26, 2016

Storage expert and Forbes.com contributor Tom Coughlin has posted a blog about the growing amount  and value of memory devices in cars. Coughlin notes, “...estimated 5% of the memory market goes into automobiles today and this is expected to grow to 10% within the next few years as cars use more and more electronic functions to provide greater safety, greater efficiency, driver assist capabi...

Save the Data: Self-Encrypting Drives

Post Type: Post    Date added: July 18, 2016

You do have a backup procedure for your computer already set up, right? If you don’t, now is the time to execute one. It should be easy. There are plenty of options, too. With ubiquitous cloud solutions and a myriad of online storage options, just a few clicks will suffice. Setting up a backup procedure should be high on your priorities list before the disaster strikes. Complete new SED i...

CIA and TPM to Secure the IoT? - Embedded Computing Design

Post Type: Post    Date added: July 12, 2016

CIA, TPM and IoT: You might ask what these three acronyms have in common and how they relate to each other. To make a long story short, it is all about security, trust, and reliability. The abbreviation CIA in this context does not mean the Central Intelligence Agency. It is an abbreviation for Confidentiality, Integrity, and Authenticity. The so-called CIA principle is a simple, but widely used,...

Trusted Computing Group to Show Securing the Internet of Things at July 11-14 IoT Evolution Expo

Post Type: Post    Date added: July 5, 2016

TCG and Cisco Systems Expert to Address Remote Monitoring and Management and IoT Standards in Panel Sessions  PORTLAND, Ore., July 5, 2016 – Trusted Computing Group and members will speak on securing the Internet of Things at the IoT Evolution Expo July 11-14, Las Vegas. Members also will show how to protect the IoT with trusted computing in Booth 612. Stacy Cannady, CISSP and technical m...

サイバーセキュリティ対策、本当に大事なことは何か?

Post Type: Post    Date added: July 1, 2016

by Jun Takei, Intel Corporation TCGの役割は、世界的を繋ぐデジタルインフラを安全に利活用するツールを、標準化を通して社会に提供することにある。一方、政府や公共セクターの役割は、その時々に安全利用のために推奨される手段、方法の「選択肢」を社会に伝えていくことが重要な役割だと考え...

IoT Time Podcast Ep. 41 Infineon and TCG

Post Type: Post    Date added: July 1, 2016

In this episode of the IoT Time Podcast, Ken Briodagh, Editorial Director at IoT Evolution, sits down with Steve Hanna, Senior Principal at Infineon Technologies and co-chair of the Trusted Computing Group's IoT Security committee. Listen here. Join TCG at the IoT Evolution Expo. Learn More....

TCG Storage Opal SSC Feature Set: Configurable Namespace Locking

Post Type: Post    Date added: June 26, 2016

The Storage Workgroup specifications provide a comprehensive architecture for Storage Devices under policy control as determined by the trusted platform host, the capabilities of the Storage Device to conform to the policies of the trusted platform, and the lifecycle state of the Storage Device as a Trusted Peripheral. Public Review: TCG Storage Opal SSC Feature Set: Configurable Namespace ...

TCG Glossary

Post Type: Post    Date added: June 23, 2016

This glossary contains definitions of terms created by TCG, or terms that have a particular meaning in trusted computing, or terms that cause particular confusion in trusted computing. TCG Glossary...

How Are You Protecting Your Organization’s Valuable Intellectual Property?

Post Type: Post    Date added: June 15, 2016

Last week, experts from TCG members Infineon and WIBU Systems talked to attendees of a free webcast (watch it here). Steve Hanna, Infineon and co-chair of TCG’s embedded systems work group, opened up the webcast by providing an overview of trusted computing, the TPM and the role of trust in the IoT. Software is vulnerable - whether it’s in a PC or an embedded system. While the Internet of T...

27K: The Security Summit for the Americas

Post Type: Post    Date added: June 15, 2016

27K: The Security Summit for the Americas will bring experts in the ISO/IEC 27001 standard together with those who are on the front lines of international IT security to promote the standard in the US and the Western Hemisphere. Track: Getting Started Topic: ISO/IEC 27040 and Self-Encrypting Storage Format: Presentation – Dr. Michael Willett Date & Time: Tuesday, September...

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.