TCG Releases Trust Assessment Framework

In today’s enterprise, cloud computing allows enterprises to acquire or maintain computer services without building the infrastructure themselves. Cloud services often are combined with in-house infrastructure in a model that’s known as the hybrid cloud. Companies also often need to link in-house or cloud services that one business is using (or supplying) with the internal … Continue reading “TCG Releases Trust Assessment Framework”

The post TCG Releases Trust Assessment Framework appeared first on Trusted Computing Group.

from TCG Releases Trust Assessment Framework

Five Minutes With…Bill Diotte, CEO, Mocana

Hacking continues and breeches still occur, regardless of how much emphasis we put on security. Why is that? Is it simply that the hackers are smarter than the folks designing in the security? That’s the question I asked Bill Diotte, the CEO of Mocana, one of the leaders in IoT security, in this week’s installment … Continue reading “Five Minutes With…Bill Diotte, CEO, Mocana”

The post Five Minutes With…Bill Diotte, CEO, Mocana appeared first on Trusted Computing Group.

from Five Minutes With…Bill Diotte, CEO, Mocana

2017 International Cryptographic Module Conference and FDE cPPs

From May 17th to 19th, I had the pleasure of attending the Fifth International Cryptographic Module Conference (ICMC 2017 http://icmconference.org/ ) with my colleague, Alexander Mazuruc.   Alex usually attends this conference (https://www.winmagic.com/blog/2013/10/29/almost-famous/)  which focuses on cryptographic modules  and FIPS 140 (https://en.wikipedia.org/wiki/FIPS_140-2) type issues,  but this year there were 8 tracks on related subjects such as … Continue reading “2017 International Cryptographic Module Conference and FDE cPPs”

The post 2017 International Cryptographic Module Conference and FDE cPPs appeared first on Trusted Computing Group.

from 2017 International Cryptographic Module Conference and FDE cPPs

@Interop ITX to Showcase TCG IoT and Network Security Solutions May 16-18

TCG members CoSoSys, Mocana, OnBoard Security and Tempered Networks will show a variety of solutions in booth #234 in the Interop Business Hall on Tuesday, May 16 through Thursday, May 18, 2017. Demos will include implementation of the Trusted Software Stack 2.0 and security for the IoT and networks. Experts from these companies also will … Continue reading “@Interop ITX to Showcase TCG IoT and Network Security Solutions May 16-18”

The post @Interop ITX to Showcase TCG IoT and Network Security Solutions May 16-18 appeared first on Trusted Computing Group.

from @Interop ITX to Showcase TCG IoT and Network Security Solutions May 16-18

TCG to Demonstrate IoT and Network Security Solutions at InterOp ITX May 16-18, 2017

PORTLAND, ORE. April 27, 2017 — Trusted Computing Group (TCG) and members will demonstrate standards-based solutions for the Internet of Things and network security at the May Interop ITX conference and exhibits (@Interop) in Las Vegas. TCG members CoSoSys, Mocana, OnBoard Security and Tempered Networks will show a variety of solutions in booth #234 in the Interop Business … Continue reading “TCG to Demonstrate IoT and Network Security Solutions at InterOp ITX May 16-18, 2017”

The post TCG to Demonstrate IoT and Network Security Solutions at InterOp ITX May 16-18, 2017 appeared first on Trusted Computing Group.

from TCG to Demonstrate IoT and Network Security Solutions at InterOp ITX May 16-18, 2017

Errata Version 1.0 for TCG TPM I2C Interface Specification Family 2.0, Level 00, Revision 1.0

This document describes errata and clarifications for the TCG TPM I2C Interface Specification Level 00 Revision 1.00 as published. The information in this document is likely – but not certain – to be incorporated into a future version of the specification. Suggested fixes proposed in this document may be modified before being published in a … Continue reading “Errata Version 1.0 for TCG TPM I2C Interface Specification Family 2.0, Level 00, Revision 1.0”

The post Errata Version 1.0 for TCG TPM I2C Interface Specification Family 2.0, Level 00, Revision 1.0 appeared first on Trusted Computing Group.

from Errata Version 1.0 for TCG TPM I2C Interface Specification Family 2.0, Level 00, Revision 1.0

Trusted Computing Group to Co-Host International Trusted Computing and Security Innovation Summit April 6th with China National Security Standards Committee

PORTLAND, Ore.–(BUSINESS WIRE)— Ideas, techniques, research and practical solutions to address security and privacy challenges will be shared at the International Trusted Computing and Security Innovation Summit hosted by the Trusted Computing Group (TCG) and TC 260 (China National Security Standards Committee) April 6, 2017, at the Lakeview Hotel at Peking University in Beijing, China. The conference … Continue reading “Trusted Computing Group to Co-Host International Trusted Computing and Security Innovation Summit April 6th with China National Security Standards Committee”

The post Trusted Computing Group to Co-Host International Trusted Computing and Security Innovation Summit April 6th with China National Security Standards Committee appeared first on Trusted Computing Group.

from Trusted Computing Group to Co-Host International Trusted Computing and Security Innovation Summit April 6th with China National Security Standards Committee

Errata Version 1.1 for Trusted Platform Module Library Specification, Family “2.0”, Revision 01.38

This document describes errata and clarifications for the TCG Trusted Platform Module Library Version 2.0 Revision 1.38 as published. The information in this document is likely – but not certain – to be incorporated into a future version of the specification. Suggested fixes proposed in this document may be modified before being published in a … Continue reading “Errata Version 1.1 for Trusted Platform Module Library Specification, Family “2.0”, Revision 01.38”

The post Errata Version 1.1 for Trusted Platform Module Library Specification, Family “2.0”, Revision 01.38 appeared first on Trusted Computing Group.

from Errata Version 1.1 for Trusted Platform Module Library Specification, Family “2.0”, Revision 01.38

Securing a factory’s OT network and the role of trust

When leaders have advanced knowledge of how and where their cyber defenses will be attacked, they mobilize resources to reinforce the targeted area. This strategy applies to both war and to hacking attacks. For manufacturing companies, a common weak link in their enterprise network is their production network.

The post Securing a factory’s OT network and the role of trust appeared first on Trusted Computing Group.

from Securing a factory’s OT network and the role of trust