Trusted Computing Group http://trustedcomputinggroup.org/ Tue, 02 Dec 2025 15:12:35 +0000 en-US hourly 1 91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey https://trustedcomputinggroup.org/91-of-businesses-do-not-have-a-roadmap-in-place-to-protect-against-quantum-threats-finds-new-industry-survey/ Tue, 02 Dec 2025 15:12:35 +0000 https://trustedcomputinggroup.org/?p=122944 Businesses in all industries are extremely vulnerable to quantum computing attacks, with a new report from the Trusted Computing Group (TCG) finding that 91% of security professionals within the USA … Continue reading "91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey"

The post 91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey appeared first on Trusted Computing Group.

]]>
How do TCG technologies protect blockchain users? https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-blockchain-users/ Tue, 18 Nov 2025 15:59:55 +0000 https://trustedcomputinggroup.org/?p=122917 A blockchain is a distributed and decentralized digital ledger of transactions that is distributed across an entire network of computers. The data within the chain is grouped into blocks, and … Continue reading "How do TCG technologies protect blockchain users?"

The post How do TCG technologies protect blockchain users? appeared first on Trusted Computing Group.

]]>
How do TCG technologies protect digital wallet users? https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-digital-wallet-users/ Tue, 04 Nov 2025 15:02:54 +0000 https://trustedcomputinggroup.org/?p=122867 Across the globe, digital wallets – software-based systems residing on smartphones, smart watches and other devices – are now commonly used to store payment information, such as debit and credit … Continue reading "How do TCG technologies protect digital wallet users?"

The post How do TCG technologies protect digital wallet users? appeared first on Trusted Computing Group.

]]>
Using a TPM to bolster anti-cheat measures in gaming https://trustedcomputinggroup.org/using-a-tpm-to-bolster-anti-cheat-measures-in-gaming/ Tue, 30 Sep 2025 14:18:56 +0000 https://trustedcomputinggroup.org/?p=122792 When it comes to the use of Trusted Platform Modules (TPMs), the benefits for protecting devices such as computers and networks is well known. However, one novel update from the … Continue reading "Using a TPM to bolster anti-cheat measures in gaming"

The post Using a TPM to bolster anti-cheat measures in gaming appeared first on Trusted Computing Group.

]]>
SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon https://www.secedge.com/news/secedge-joins-tcg-approved-vendors-with-sec-tpm-a-groundbreaking-tpm-2-0-solution-for-arm-trustzone-enabled-silicon/#new_tab Tue, 30 Sep 2025 01:34:36 +0000 https://trustedcomputinggroup.org/?p=122788 SEC-TPM™ stands as an industry first, pioneering security in Edge AI and enhancing application data privacy for confidential computing AI security and data privacy have received a major boost today … Continue reading "SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon"

The post SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon appeared first on Trusted Computing Group.

]]>
TCG and OST2 Expands Curriculum for Developing Cybersecurity Experts in Trusted Computing https://trustedcomputinggroup.org/tcg-and-ost2-expands-curriculum-for-developing-cybersecurity-experts-in-trusted-computing/ Tue, 23 Sep 2025 04:17:11 +0000 https://trustedcomputinggroup.org/?p=122776 Software developers and students interested in device security will be given the chance to enhance their cybersecurity skills and the security of devices through a new technical security training program … Continue reading "TCG and OST2 Expands Curriculum for Developing Cybersecurity Experts in Trusted Computing"

The post TCG and OST2 Expands Curriculum for Developing Cybersecurity Experts in Trusted Computing appeared first on Trusted Computing Group.

]]>
Ensuring cyber resilience from the hardware up https://trustedcomputinggroup.org/ensuring-cyber-resilience-from-the-hardware-up/ Wed, 17 Sep 2025 04:11:29 +0000 https://trustedcomputinggroup.org/?p=122774 Today’s security models are increasingly reliant on dedicated security processors to perform critical measurements within devices and systems. In many cases, a Trusted Platform Module (TPM) is integrated to handle … Continue reading "Ensuring cyber resilience from the hardware up"

The post Ensuring cyber resilience from the hardware up appeared first on Trusted Computing Group.

]]>
How the TPM will protect computing devices over the next 25 years https://trustedcomputinggroup.org/how-the-tpm-will-protect-computing-devices-over-the-next-25-years/ Wed, 27 Aug 2025 15:09:30 +0000 https://trustedcomputinggroup.org/?p=122730 In our last blog, we looked at the work done by our members to develop and popularize the Trusted Platform Module (TPM) since its inception. Now, we look to the … Continue reading "How the TPM will protect computing devices over the next 25 years"

The post How the TPM will protect computing devices over the next 25 years appeared first on Trusted Computing Group.

]]>
What is post quantum cryptography, and how is TCG implementing it? https://trustedcomputinggroup.org/what-is-post-quantum-cryptography-and-how-is-tcg-implementing-it/ Thu, 14 Aug 2025 02:43:12 +0000 https://trustedcomputinggroup.org/?p=122710 In the future, there will soon be a time when someone builds a quantum device powerful enough that it can be used to break the most widely used forms of … Continue reading "What is post quantum cryptography, and how is TCG implementing it?"

The post What is post quantum cryptography, and how is TCG implementing it? appeared first on Trusted Computing Group.

]]>
How the Reference Integrity Manifest (RIM) delivers secure firmware https://trustedcomputinggroup.org/how-the-reference-integrity-manifest-rim-delivers-secure-firmware/ Tue, 24 Jun 2025 14:03:27 +0000 https://trustedcomputinggroup.org/?p=122615 When it comes to hacking attempts, it’s not just software and hardware attacks that are on the rise, but the firmware too. Bolstered by the growing reliance we have on … Continue reading "How the Reference Integrity Manifest (RIM) delivers secure firmware"

The post How the Reference Integrity Manifest (RIM) delivers secure firmware appeared first on Trusted Computing Group.

]]>
Reflecting on the TPM: over 25 years of computing security https://trustedcomputinggroup.org/reflecting-on-the-tpm-over-25-years-of-computing-security/ Mon, 09 Jun 2025 14:10:29 +0000 https://trustedcomputinggroup.org/?p=122618 In our latest blog covering the 25th anniversary of the TPM, we hear from TCG legends Dave Grawrock, Steve Hanna, Monty Wiseman and Dave Challener on the development of the … Continue reading "Reflecting on the TPM: over 25 years of computing security"

The post Reflecting on the TPM: over 25 years of computing security appeared first on Trusted Computing Group.

]]>
Securing Edge AI through trusted computing https://trustedcomputinggroup.org/securing-edge-ai-through-trusted-computing/ Thu, 22 May 2025 05:51:02 +0000 https://trustedcomputinggroup.org/?p=122560 In today’s computing landscape, edge computing has proven to be a highly viable and low-latency option for real-time operations. By leveraging local compute devices – such as IoT nodes, small … Continue reading "Securing Edge AI through trusted computing"

The post Securing Edge AI through trusted computing appeared first on Trusted Computing Group.

]]>
TCG welcomes Arm as new board member to make trusted computing a core pillar of system architecture https://trustedcomputinggroup.org/tcg-welcomes-arm-as-new-board-member-to-make-trusted-computing-a-core-pillar-of-system-architecture/ Tue, 06 May 2025 21:33:51 +0000 https://trustedcomputinggroup.org/?p=122539 The Trusted Computing Group (TCG) has announced Arm has today joined the Board of Directors, with Dong Wei appointed as its representative. The ubiquitous Arm compute platform touches 100 percent … Continue reading "TCG welcomes Arm as new board member to make trusted computing a core pillar of system architecture"

The post TCG welcomes Arm as new board member to make trusted computing a core pillar of system architecture appeared first on Trusted Computing Group.

]]>
Enhancing Data Security and Residency through Trusted Confidential Computing https://trustedcomputinggroup.org/enhancing-data-security-and-residency-through-trusted-confidential-computing/ Mon, 05 May 2025 18:03:58 +0000 https://trustedcomputinggroup.org/?p=122553 In an era of increasing cyber threats and stringent data protection regulations, ensuring data security throughout its lifecycle is paramount. Governments and enterprises alike are enforcing data residency laws that … Continue reading "Enhancing Data Security and Residency through Trusted Confidential Computing"

The post Enhancing Data Security and Residency through Trusted Confidential Computing appeared first on Trusted Computing Group.

]]>
Trusted Computing Group Storage Work Group Call For Participation https://trustedcomputinggroup.org/trusted-computing-group-storage-work-group-call-for-participation/ Fri, 04 Apr 2025 18:34:36 +0000 https://trustedcomputinggroup.org/?p=122489 Call For Participation! The TCG Storage Work Group (WG) is starting work to define a new feature set specification, the Hard Cryptographic Purge feature set specification, to enable hardware-based cryptographic … Continue reading "Trusted Computing Group Storage Work Group Call For Participation"

The post Trusted Computing Group Storage Work Group Call For Participation appeared first on Trusted Computing Group.

]]>
Trusted Computing Future: Emerging Use Cases and Solutions https://trustedcomputinggroup.org/trusted-computing-future-emerging-use-cases-and-solutions/ Fri, 07 Mar 2025 16:19:21 +0000 https://trustedcomputinggroup.org/?p=122425 The following presentation was presented at the 2025 TCG February Members Meeting in Austin, USA. This presentation was by Ramki Krishnan (Intel), Ned Smith (Intel), Diego Lopez (Telefonica), and Ghada … Continue reading "Trusted Computing Future: Emerging Use Cases and Solutions"

The post Trusted Computing Future: Emerging Use Cases and Solutions appeared first on Trusted Computing Group.

]]>
The attacks of 2024, and how trusted computing could’ve helped https://trustedcomputinggroup.org/the-attacks-of-2024-and-how-trusted-computing-couldve-helped/ Sat, 22 Feb 2025 14:04:33 +0000 https://trustedcomputinggroup.org/?p=122519 With cyber-attacks growing in both volume and complexity each year, it should come as no surprise to hear 2024 was marked by many significant, often devastating attacks and hacks. For … Continue reading "The attacks of 2024, and how trusted computing could’ve helped"

The post The attacks of 2024, and how trusted computing could’ve helped appeared first on Trusted Computing Group.

]]>
Trusted Computing in 2025: The Trends to Expect https://trustedcomputinggroup.org/trusted-computing-in-2025-the-trends-to-expect/ Tue, 04 Feb 2025 18:30:41 +0000 https://trustedcomputinggroup.org/?p=122364 Every year, the computing landscape evolves as a result of new technological innovations and evolving threat tactics. With the rise of new technologies and shifting attack methods, it may be … Continue reading "Trusted Computing in 2025: The Trends to Expect"

The post Trusted Computing in 2025: The Trends to Expect appeared first on Trusted Computing Group.

]]>
New TPM specification redefines firmware security for connected devices https://trustedcomputinggroup.org/new-tpm-specification-redefines-firmware-security-for-connected-devices/ Tue, 04 Feb 2025 15:24:23 +0000 https://trustedcomputinggroup.org/?p=122362 Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM 2.0 specification from the Trusted Computing Group (TCG). Manufacturers attach … Continue reading "New TPM specification redefines firmware security for connected devices"

The post New TPM specification redefines firmware security for connected devices appeared first on Trusted Computing Group.

]]>
New computing specification secures sensitive information while enhancing device performance https://trustedcomputinggroup.org/new-computing-specification-secures-sensitive-information-while-enhancing-device-performance/ Sun, 12 Jan 2025 15:16:52 +0000 https://trustedcomputinggroup.org/?p=122335 Sensitive data and device operations can now be kept safe in a more secure environment, thanks to the new specification launched by the Trusted Computing Group (TCG). Previously, the majority … Continue reading "New computing specification secures sensitive information while enhancing device performance"

The post New computing specification secures sensitive information while enhancing device performance appeared first on Trusted Computing Group.

]]>