Want to know TCG member Thorsten Stremlau's prediction for the biggest security trend of 2026? You can read it in the latest issue of Revista SIC-Ediciones Coda by visiting their website - Thorsten's contribution is on page 129: https://lnkd.in/ep8bzR9p
Trusted Computing Group
Information Technology & Services
Beaverton, OR 1,577 followers
Trusted Computing Group develops open standards for computing security.
About us
The Trusted Computing Group (TCG) is a global organization that develops open security standards and specifications based on root of trust enabling secure interoperable systems and networks across industries. The TCG category of secure computing has created billions of secure endpoints across industries and technologies. The Root of Trust is the foundation TCG specifications are based upon with proven concepts to ensure the integrity of systems, protection of data and security for networks. Through Open, end-to-end standards, TCG and its global membership of the leading PC and server, semiconductor, software, networking, services and mobile device makers create specifications and international standards free to developers, manufacturers and users. Trusted Computing is a category of computing with a fundamentally secure approach based on a root of trust.” 54 new endpoints every second.
- Website
-
http://www.trustedcomputinggroup.org
External link for Trusted Computing Group
- Industry
- Information Technology & Services
- Company size
- 201-500 employees
- Headquarters
- Beaverton, OR
- Type
- Nonprofit
- Founded
- 2003
- Specialties
- Internet Security, Software Security, Network Security, and Hardware Security
Locations
-
Primary
Get directions
3855 SW 153rd Dr
Beaverton, OR 97003, US
Employees at Trusted Computing Group
Updates
-
On 3 March, Marketing Co-Chair of the Trusted Computing Group, Thorsten Stremlau, will participate in a webinar hosted by IoT Insider, titled, ‘Protecting Businesses Against the Quantum Threat. Attendees will learn how quantum computers could render current cryptographic methods vulnerable, why IoT devices are particularly exposed due to long lifecycles and constrained hardware, and what “harvest now, decrypt later” attacks mean for sensitive data. Key discussion points include: ➡️Understanding the quantum threat and its impact on IoT security ➡️Practical steps for building crypto agility and future-proofing connected devices ➡️Managing secure firmware updates, device identity, and data-in-transit protection in a post-quantum world ➡️Case studies and examples of organisations proactively preparing for quantum risk Join Thorsten alongside other leading quantum experts from 9:00AM EST. Register using this link: https://lnkd.in/euuJYdHa
-
-
In our latest video, we speak to PC Client Work Group Co-Chair Amy Nelson regarding the work TCG is doing in respect to post quantum cryptography (PQC). Watch the full video on YouTube here: https://lnkd.in/eEy2qr2c #PostQuantumCryptography #SecurityStandards #TrustedComputing
PQC is the LARGEST TECHNOLOGY CHANGE of my lifetime: PC-Client Co-Chair Amy Nelson.
https://www.youtube.com/
-
Want to know how our Technical Committee is aiding our migration to PQC algorithms? In our latest video, Joshua Schiffman explains how TCG is updating its technologies in order to adhere to the era of PQC. Joshua details why the work of the TC is vital to these efforts, ensuring consistency and conformity across all specifications. Watch in full on YouTube: https://lnkd.in/eGdNaTMw
Why TCG is updating its ALGORITHM REGISTRIES: Joshua Schiffman explains
https://www.youtube.com/
-
In this week's special episode of the 'Inside Trusted Computing Podcast', Thorsten Stremlau is joined by Cal Dunnington to go over the findings of the TCG's 'State of PQC Readiness Report'! The survey revealed some interesting insight into the preparations businesses are engaging in ahead of full PQC migration, including the staggering fact that 91% of businesses do not have a migration roadmap in place. Listen to the full episode here: Spotify - https://lnkd.in/edyB-zuf YouTube - https://lnkd.in/e8xZV6GN Apple Podcasts - https://lnkd.in/eJbMuXye
-
A big thank you to everyone who attended our Members Meeting and JRF workshop this week - whether in person or virtually! Significant, outstanding progress has been made across our Work Groups this week, and we'd like to thank our JRF representatives for organizing such an insightful workshop detailing the areas of security pivotal to Japan. We look forward to welcoming everyone back to our next Members Meeting in June.
-
-
In our next presentation, Jeff Andersen is explaining to attendees the ways in which AI is changing the concept of attestation, and the latter's role in mitigating the risks of rollback attacks and rogue insiders, while providing transparency to users.
-
-
Following a short break, Supply Chain Security Co-Chair Dr. Joshua Schiffman is now delivering an insightful presentation on the ways TCG technologies can resolve supply chain concerns. Joshua is also detailing the ways these technologies can be mapped to key regulatory frameworks and compliance standards.
-
-
In the second TCG presentation of the workshop, TPM Co-Chair Chris Fenner is providing insights into PQC composite signatures and key encapsulations! Attendees are learning how to combine a post-quantum key with a classical key to mitigate the risks of migrating to new implementations of cryptographic algorithms.
-