Trusted computing is an essential element when it comes to security. Covering the standards, specifications, components and technologies required to make computing more secure, the concept empowe...
https://trustedcomputinggroup.org/three-key-sectors-where-trusted-computing-can-make-a-difference/
In an era when connectivity is king, there is no part of the globe safe from those seeking to infiltrate digital networks. This is certainly true in Europe, where hackers … Continue reading "Re...
https://trustedcomputinggroup.org/regulatory-reflections-the-nis-2-directive/
Within the United Kingdom (UK), there are approximately nine connected devices in every household, and this number is only going to grow. For example, by the end of 2024 the … Continue reading ...
https://trustedcomputinggroup.org/regulatory-reflections-the-united-kingdoms-psti-act/
In our Regulatory Review series, we have already covered a number of Acts that have come into place in recent years. This time, we are turning our attentions to a … Continue reading "Regulatory...
https://trustedcomputinggroup.org/regulatory-reflections-cyber-resilience-act/
In the last two blogs in the series, we covered a number of regulations relating to connected devices within the United States: the US Cyber Trust Mark and the PATCH … Continue reading "Regulat...
Healthcare institutions have remained a key target for hackers in recent years. 2023 saw two unfortunate records set when it comes to cybersecurity, with the most data breaches and the … Contin...
https://trustedcomputinggroup.org/regulatory-reflections-the-patch-act/
Internet of Things (IoT) devices continue to underpin business operations of enterprises across the globe. Over 29 billion connected devices are expected to be online by 2027, but their vulnerabi...
https://trustedcomputinggroup.org/regulatory-reflections-the-u-s-cyber-trust-mark-program/
Last month, the Japan Regional Forum held the ‘TCG’s Challenge for Next Generation Cyber Security’ open workshop. Aiming to enhance IT and cybersecurity literacy across Japan, participants ...
https://trustedcomputinggroup.org/security-by-design-highlights-from-the-jrfs-open-workshop/
A company of NEC, Cyber Defense Institute (CDI), a Japanese Cyber Security Company, launches the cloud-based private certification authority solution PIV Gateway™ CA that supports not only trad...
NEC provided a “remote verification platform” that enables remote detection of tampering with computer equipment as a cybersecurity measure in the supply chain to an Open Workshop held in Feb...