13 Results for:TCG
- Sort by:
TCG releases TPM 2 specification for improved security
10 Apr 2014The Trusted Computing Group has published an updated specification for the Trusted Platform Module Read More
How can I protect my self-encrypting drives?
07 Mar 2019Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on vulnerable solid-state drives? Read More
Microsoft, TCG partner on network access control; Cisco takes own route
21 May 2007Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures that ... Read More
Storage 101: Self-encrypting drives' benefits and limitations
07 Sep 2018Self-encrypting drives are a cost-effective way to ensure compliance in certain situations. We look at self-encrypting drives, what they’re good for and their limitations Read More
Use centralized encryption methods in large-scale IT environments
27 Sep 2019Whether data is stored in a VM or in the cloud, centralized encryption key management is critical to prevent theft and protect data from unwanted eyes. Read More
SSD encryption failures made worse by BitLocker settings
12 Nov 2018Researchers discover major manufacturers poorly implemented SSD encryption, allowing easy access to data, and Microsoft BitLocker made the issue worse. Read More
Inside the snake pit with ‘angr’ Python framework creator
05 Jan 2018Professor Giovanni Vigna has been lauded as the world’s fourth most influential researcher in cyber security and is the founder of Lastline, a malware protection company. He is responsible for ... Read More
2012: Will this be the year TPM finally comes of age?
12 Jun 2012Will 2012 be the year that TPM finally delivers on its potential to provide a hardware-based "root of trust" for enterprise information security? Read More
Weighing the pros and cons of the Trusted Computing Platform
03 Oct 2011When used as designed, trusted computing can provide a high level of security, but limitations and potential for abuse prohibits its usefulness. Read More
Trusted Computing Group releases server specs
06 Aug 2005The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches. Read More