Trusted Computing

4.4K posts

Trusted Computing banner
Trusted Computing

Trusted Computing

@TrustedComputin

Trusted Computing Group develops open standards for computing security. #TCGCodeGen

Portland OR Katılım Mart 2009
873 Takip Edilen2.6K Takipçiler
Trusted Computing
Trusted Computing@TrustedComputin·
A new research development demonstrates how Trusted Platform Module (TPM) technology can enable vendor-neutral confidential computing — strengthening trust and interoperability across platforms. Building on specifications developed by the Trusted Computing Group (TCG) and implemented by its members, this approach showcases how hardware-based roots of trust can support the protection of sensitive data even during processing. As the industry continues to advance confidential computing, this work reinforces the value of open standards in delivering consistent, reliable, and verifiable security across diverse environments. 🔗 Read more: bit.ly/3WtNuLY #TrustedComputing #TPM #CyberSecurity #OpenStandards #HardwareSecurity
Trusted Computing tweet media
English
0
1
1
196
Trusted Computing
Trusted Computing@TrustedComputin·
Edge computing and AI have both proved to be viable and low-latency options for real-time operations. Developments in both have led to the development of Edge AI, which actions time-sensitive tasks locally for reduced bandwidth usage and lower operational overheads. Our Trusted Platform Modules (TPMs) play a pivotal role in ensuring these processes, and the sensitive data involved, remain protected. Read our latest blog to learn how: bit.ly/4dDXQAD
Trusted Computing tweet media
English
0
1
3
294
Trusted Computing
Trusted Computing@TrustedComputin·
TCG’s most recent Members Meeting opened with an insightful presentation on ‘Trusted Computing Future: Emerging Use Cases and Solutions’, delivered by Ram (Ramki) Krishnan and Ned Smith. A key part of this presentation was the concept of Trusted Confidential Computing (TCC) - a framework used to establish data security by integrating several critical components. In TCG’s latest blog post, we explore how the TCC functions, highlight current use cases, and discuss compliance with key regulations. Read it here: bit.ly/4dvChCf #TrustedComputingGroup #TrustedConfidentialComputing #TCC #TCG
Trusted Computing tweet media
English
0
1
1
297
Trusted Computing
Trusted Computing@TrustedComputin·
The Trusted Computing Group is delighted to welcome Arm to the Board of Directors, with Dong Wei, MBA appointed as its representative. As a member of the Board, Arm will bring a range of perspectives across different markets and its wide-ranging CPU architecture ecosystem to ensure TCG standards and specifications remain suitable for today’s computing landscape. TCG President, Joe Pennisi, said, “Arm delivers one of the most power-efficient, highest performing compute platforms, and is a leading player in driving security standards. Dong and other Arm members have contributed significantly to TCG, making Arm a welcome addition to our Board.” Read the full press release here: bit.ly/3GL7iFT #TrustedComputingGroup #TCG
Trusted Computing tweet media
English
0
1
1
145
Trusted Computing
Trusted Computing@TrustedComputin·
In our latest #TPM Anniversary video, TPM Co-Chair Brad Litterell acknowledges the work TCG members did in the past to enable the standard to become commonplace within computing, and provides insight into the current activities of the Work Group. You can find the video on our LinkedIn channel: linkedin.com/feed/update/ur…
English
0
1
1
140
Trusted Computing
Trusted Computing@TrustedComputin·
BREAKING: TCG President Joe Pennisi is the cover star of the the latest issue of Intelligent CISO! On the 25th Anniversary of the TPM, Joe delves into the critical role this standard has had in protecting devices, and how it will continue to evolve to meet the future computing landscape. The full article can be found on page 51: bit.ly/41V9VNC
Trusted Computing tweet media
English
0
1
1
122
Trusted Computing
Trusted Computing@TrustedComputin·
As we celebrate the Trusted Platform Module (TPM) turning 25, some of our members take a trip down memory lane to speak about their personal involvement in developing the TPM. In our latest TPM video, Co-Chair of the Infrastructure Work Group, Monty Wiseman, describes his initial work on the TPM. You can watch the full video here: bit.ly/4bDuiCb #TPM25 #TPM #TrustedComputing
English
0
1
3
188
Trusted Computing
Trusted Computing@TrustedComputin·
The widespread adoption of the Trusted Platform Module (TPM) across more than a billion devices was largely driven by one key factor: the dedication of TCG members. As we mark the TPM’s 25th anniversary, TPM Workgroup Chair, Chris Fenner, highlights the vital role of the TCG community in shaping future innovations. You can watch the full video here: bit.ly/4ham1qz #TPM25 #TPM #TrustedComputing
English
0
1
1
135
Trusted Computing
Trusted Computing@TrustedComputin·
TCG will be attending Security Days Spring 2025 in Tokyo! On March 11, Atsushi Nagata, Marie Ando and Tsukasa Kobayashi from TCG's Japan Regional Forum (JRF), will be leading a workshop on the role that TCG and the TPM plays in the cybersecurity landscape. bit.ly/3XovjrN
English
0
2
1
181
Trusted Computing
Trusted Computing@TrustedComputin·
As a new year unfolds, fresh trends emerge - and the computing landscape is no exception. From AI integration to the rise of quantum computing threats, cybersecurity is evolving rapidly, bringing both new opportunities and challenges. In our latest blog, we explore five key cybersecurity trends for 2025 and how organizations can stay ahead of emerging threats. Read more, here: bit.ly/4gJ54TD #TCG #TrustedComputing #2025
Trusted Computing tweet media
English
0
1
2
133
Trusted Computing
Trusted Computing@TrustedComputin·
As we celebrate 25 years of the Trusted Platform Module (TPM), what could the next 25 years, and beyond, look like for the TPM? TCG Workgroup Chair, Amy Nelson, tells us more. Watch the full video, here: bit.ly/3WVYJNC #TPM25 #TCG #TrustedComputing
English
0
0
0
167
Trusted Computing
Trusted Computing@TrustedComputin·
The Trusted Computing Group is always developing and expanding new ideas around the Trusted Platform Module (TPM). But just how important is the TPM to TCG? Stephanie Schultz, MBA tells us more⬇️ You can watch the full video here: bit.ly/4hs5Sxq #TPM25 #TCG #TrustedComputing
English
0
1
1
186
Trusted Computing
Trusted Computing@TrustedComputin·
Despite the TPM’s modern presence in over 2 billion devices worldwide, its early development was met with skepticism from both governments and organisations. Former TCG member and retired security architect, David Grawrock, addresses how TCG overcame these barriers to kickstart the TPM’s journey to becoming a leading hardware solution. Watch the full video, here: bit.ly/4h8Akw4 #TPM25 #TPM #TrustedComputing
English
0
1
2
107
Trusted Computing
Trusted Computing@TrustedComputin·
In a time before the Trusted Platform Module (TPM), looming threats from the evolving digital landscape meant that a solution was needed to address the impending risks. In our most recent #TPM video, Former TCG member Stephen Heil, explains how computing advancements resulted in widespread demand for hardware Roots-of-Trust like the TPM. Watch the full video here: lnkd.in/eXvsHj_n #TPM25 #TCG #TrustedComputing
English
0
1
1
159
Trusted Computing
Trusted Computing@TrustedComputin·
Over the last 25 years, the Trusted Platform Module (TPM) has been installed in billions of devices worldwide. But did you know that much of the early work done by the Trusted Computing Group (TCG) was to build trust with governments and privacy groups who were first apprehensive about the nature of the TPM? In our latest #TPM video, former TCG President Scott Rotondo speaks more about his early experiences working as the organization’s President, and the industry challenges at that time that led to the development of the TPM. You can watch the full video here: bit.ly/4gZlatt #TPM25 #TPM #TrustedComputing
English
0
1
1
185
Trusted Computing
Trusted Computing@TrustedComputin·
As we celebrate the 25th anniversary of the TPM, we also celebrate those that have helped shape the TPM into what it is today. In this video, Steve Hanna, Distinguished Engineer at Infineon, speaks about his early work on the TPM. Watch the full video here: bit.ly/401n3Qb #TPM #TrustedComputing
English
0
1
1
155
Trusted Computing
Trusted Computing@TrustedComputin·
Cryptographic modules are vital for securing sensitive data, yet evolving cyber threats and advancing technology have revealed vulnerabilities in existing standards. Enter FIPS 140-3 - the latest certification from NIST that strengthens requirements across hardware, software, and hybrid models, addressing the needs of today’s computing landscape. In our latest blog, we explore how TCG’s guidance on FIPS 140-3 accelerates certification, empowering governments and critical sectors to enhance device security in the face of rising threats: bit.ly/418viuG #CyberSecurity #FIPS1403 #TrustedComputing #DataProtection
Trusted Computing tweet media
English
0
1
1
176
Trusted Computing
Trusted Computing@TrustedComputin·
We are delighted to highlight our member @SEC_eDGE and their innovative SEC-TPM™, a groundbreaking TPM 2.0 solution for Arm® TrustZone™-enabled silicon. This game-changing technology enhances AI security, application data privacy, and confidential computing. Learn more about how SEC-TPM is setting new standards for edge security and device integrity below 👇 #TrustedComputing #IoTSecurity #EdgeAI #ConfidentialComputing
SecEdge@SecEdge_Inc

SecEdge Joins #TCG-Approved Vendors with #SECTPM™, a Groundbreaking #TPM 2.0 Solution for @Arm #TrustZone™-Enabled #Silicon @TrustedComputin READ HERE: bit.ly/3UY4eud #EdgeComputing #AI #EmbeddedDevices #IoTSecurity #IoT

English
0
1
1
167
Trusted Computing
Trusted Computing@TrustedComputin·
Want to learn how businesses can leverage trusted computing technologies to navigate and comply with new cybersecurity regulations, such as the Cyber Resilience Act (CRA) and NIS2? In his latest article for Electronic Specifier, Thorsten Stremlau discusses the importance of adopting standards like TPM, DICE, and CyRes to enhance cyber resilience in connected devices, while ensuring compliance with the latest regulations and strengthening defenses against cyber threats. Read the full article (p52-54) to learn more about how trusted computing can help businesses meet evolving cybersecurity regulations: bit.ly/4fesale Big thank you to Silviu Vlasceanu and the CyRes Work Group for their input on this piece! #IoT #CyberResilience #TrustedComputing
Trusted Computing tweet media
English
3
0
0
273