13 Results for:TCG

  • Sort by: 

TCG releases TPM 2 specification for improved security

By Warwick Ashford 10 Apr 2014

The Trusted Computing Group has published an updated specification for the Trusted Platform Module Read More

How can I protect my self-encrypting drives?

By Judith Myerson 07 Mar 2019

Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on vulnerable solid-state drives? Read More

Microsoft, TCG partner on network access control; Cisco takes own route

21 May 2007

Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures that ... Read More

Storage 101: Self-encrypting drives' benefits and limitations

By Antony Adshead 07 Sep 2018

Self-encrypting drives are a cost-effective way to ensure compliance in certain situations. We look at self-encrypting drives, what they’re good for and their limitations Read More

Use centralized encryption methods in large-scale IT environments

By Stuart Burns 27 Sep 2019

Whether data is stored in a VM or in the cloud, centralized encryption key management is critical to prevent theft and protect data from unwanted eyes. Read More

SSD encryption failures made worse by BitLocker settings

By Michael Heller 12 Nov 2018

Researchers discover major manufacturers poorly implemented SSD encryption, allowing easy access to data, and Microsoft BitLocker made the issue worse. Read More

Inside the snake pit with ‘angr’ Python framework creator

By Adrian Bridgwater 05 Jan 2018

Professor Giovanni Vigna has been lauded as the world’s fourth most influential researcher in cyber security and is the founder of Lastline, a malware protection company. He is responsible for ... Read More

2012: Will this be the year TPM finally comes of age?

By Warwick Ashford 12 Jun 2012

Will 2012 be the year that TPM finally delivers on its potential to provide a hardware-based "root of trust" for enterprise information security? Read More

Weighing the pros and cons of the Trusted Computing Platform

By Bill Kleyman 03 Oct 2011

When used as designed, trusted computing can provide a high level of security, but limitations and potential for abuse prohibits its usefulness. Read More

Trusted Computing Group releases server specs

06 Aug 2005

The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches. Read More