Share this page | Email | Contact Us

Special Report on

Trusted Computing Group

trusted computing group special research report Photo by
Lost or stolen data is probably the IT manager�s worst nightmare. The problems are real, the consequences are extremely serious, and if you do nothing about it, the likelihood of this happening to your company is increasing. Software-based approaches cannot provide the security required for a totally reliable protection. Hardware-based solutions used to establish a strong digital identity for both computer systems and users take security to a higher level. Disclosing confidential information has costly consequences. If the information involves company secrets, such as proprietary process information or market strategy including ...
Whatever happened to Microsoft's DRM plan
Academics warned it could “support remote censorship” and blacklists, likening Palladium to the Soviet Union’s efforts to register typewriters and fax machines. Privacy activists predicted it would hand Microsoft “an unprecedented level of control” over the world, and free software doyen Richard Stallman solemnly dubbed it “treacherous computing.” “I think it’s interesting that the (Trusted Computing Group) technology is continuing, but the big DRM push, so far, has not happened,” Landau said. “It has changed from something that was very revolutionary and ... market research, surveys and trends
Secure Elements Joins Trusted Computing Group
Secure Elements, Inc., a leader in enterprise vulnerability management and compliance risk reduction solutions, has joined Trusted Computing Group(TCG), a non-profit organization devoted to the creation of standards for strengthening computing platforms against software based attacks. Traditional security approaches have left computing platforms vulnerable to malicious attacks, virtual or physical theft, and loss," said Brian Berger, TCG marketing work group chair. Secure Elements' expertise with active protection technologies for all classes of assets will be a valuable contribution in the development of future ... market research, surveys and trends


NAC: More Is More - Network Computing
In this virtual event you'll hear about the latest innovations to help you address the challenges virtualization places on your infrastructure now and prepare for cloud computing in the future. Learn how a top-to-bottom transformation is increasing system availability and ensuring better business continuity to transform workflow and improve business agility. More Events » Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters. Sign Up Tags: Andy Dornan ,  CNAC ,  Cisco ,  Microsoft ,  Mike Fratto ,  NAC frameworks ,  NAC projects ... industry trends, business articles and survey research
Infineon Launches Windows Server 2008-compatible Trusted Computing ...
Microsoft Windows Server 2008 Launch, Los Angeles, California – February 27, 2008 – Infineon Technologies (FSE/NYSE: IFX), a leading supplier of integrated circuits and supporting software for secure computing and communications devices, today announced the Trusted Computing Management Server (TCMS) software suite for central management of Trusted Platform Modules (TPM)-equipped PCs in enterprise environments. The TCMS software suite can be bundled with Infineon’s TPM Professional Package Software V3.5 for a complete hardware and software solution for enterprise professionals to safely protect their client data. The ... industry trends, business articles and survey research
Data Security in Flash Devices
USB drives, SSDs and other flash-based storage devices are used for storing personal and other sensitive data.  Eliminating data on flash devices is required to help protect sensitive data.  Traditional secure erase on flash creates endurance issues, crypto-erase is preferred.  By the use of enhanced secure erase (or crypto-erase) SSDs should be able to be qualified as FIPS 140 complaint, making them available for many military and government applications. Getting rid of sensitive data is an ongoing issue with digital storage devices. Hard disk drives have long been primary storage repositories and ... market trends, news research and surveys resources
Editor's Choice Awards Recognize Mercury Computer Systems' Latest Integrated ...
a trusted ISR subsystems provider, has been recognized with two Editor's Choice Awards for market-leading, standards-based solutions to complex embedded challenges that exponentially simplify and speed development. The awards from Military Embedded Systems magazine focus on the latest examples in Mercury's history of innovations for embedded computing. The first award, announced in June 2010, was for Mercury's Graphical Processing Unit (GPU)-based, OpenVPX(TM) ISR subsystems. These powerful subsystems are designed uniquely to heighten the war-fighters' ... market trends, news research and surveys resources


Securing Storage - The Trusted Computing Group (TCG) Storage ...
The Trusted Computing Group (TCG) can provide the basic security plumbing. The TCG .... The Trusted Computing Group's Role (TCG) ... technology research, surveys study and trend statistics
Next Generation Secure Computing Base
Trusted Platform Module (a future Trusted Computing Group specification level will formally define an NGSCB capable TPM). The SSC provides functions such as ... technology research, surveys study and trend statistics
Trusted Computing Group: Goals, Achievements and Controversies ...
The Trusted Computing Group (TCG) has defined the. Trusted Platform Module 1.2 ( TPM) to support ... Trusted Computing Group and how to preserve diversity ...
  1. profile image danphilpott @frednecksec Had to check, didn't think Trusted Computing Group had a Trusted Cyberspace Working Group.
  2. profile image davidoberry RT @jjx: RT @TrustedComputin: IEEE article notes benefits of Trusted Computing Group IF MAP to connect security devices
  3. profile image jjx RT @TrustedComputin: IEEE article notes benefits of Trusted Computing Group IF MAP to connect security devices,
WikiAnswers - What is a TPM chip
The Trusted Platform Module (TPM) chip designed by the TCG (Trusted Computing Group), it stores passwords, encryption keys and digital certificates. Pros: -Provides added security in case your laptop got lost or stolen, the above average joe won't be able to get into it. - Data stored on your hard-drive can be encrypted, again the above average joe won't be able to access the content of drive of your stolen laptop. -With SSO(Single Sign-On) you don't have to remember a ton of complicated passwords anymore, let your fingerprint be your identity. Cons: -with DRM (Digital Rights Mgmt) being worked on by the same ...
Hardware TPM Hacked • mozillaZine Forums
The Trusted Computing Group, which sets standards on TPM chips, called the attack "exceedingly difficult to replicate in a real-world environment." About the hack ... 09/1557204 About Treacherous Computing Omega X   Posts: 2532 Joined: October 18th, 2007, 2:38 pm Location: A Parallel Dimension... Posted February 10th, 2010, 5:24 pm Sounds like the GSM group. Someone will make it easier. Latest: Firefox/3.6.8 - Thunderbird/3.1.1 - SeaMonkey/2.0.6 - Camino/2.0.3 - Songbird/1.7.3 Nightly: Minefield/4.0b3pre - Thunderbird/3.2a1pre - ...