Trusted Computing (@trustedcomputin) 's Twitter Profile
Trusted Computing

@trustedcomputin

Trusted Computing Group develops open standards for computing security. #TCGCodeGen

ID: 26588404

linkhttp://www.trustedcomputinggroup.org calendar_today25-03-2009 20:53:40

4,4K Tweet

2,2K Followers

888 Following

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

Want to learn how businesses can leverage trusted computing technologies to navigate and comply with new cybersecurity regulations, such as the Cyber Resilience Act (CRA) and NIS2? In his latest article for Electronic Specifier, Thorsten Stremlau discusses the importance of

Want to learn how businesses can leverage trusted computing technologies to navigate and comply with new cybersecurity regulations, such as the Cyber Resilience Act (CRA) and NIS2?

In his latest article for Electronic Specifier, Thorsten Stremlau discusses the importance of
Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

We are delighted to highlight our member @SEC_eDGE and their innovative SEC-TPM™, a groundbreaking TPM 2.0 solution for Arm® TrustZone™-enabled silicon. This game-changing technology enhances AI security, application data privacy, and confidential computing. Learn more about

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

Cryptographic modules are vital for securing sensitive data, yet evolving cyber threats and advancing technology have revealed vulnerabilities in existing standards. Enter FIPS 140-3 - the latest certification from NIST that strengthens requirements across hardware, software,

Cryptographic modules are vital for securing sensitive data, yet evolving cyber threats and advancing technology have revealed vulnerabilities in existing standards.

Enter FIPS 140-3 - the latest certification from NIST that strengthens requirements across hardware, software,
Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

As we celebrate the 25th anniversary of the TPM, we also celebrate those that have helped shape the TPM into what it is today. In this video, Steve Hanna, Distinguished Engineer at Infineon, speaks about his early work on the TPM. Watch the full video here:

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

Over the last 25 years, the Trusted Platform Module (TPM) has been installed in billions of devices worldwide. But did you know that much of the early work done by the Trusted Computing Group (TCG) was to build trust with governments and privacy groups who were first

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

In a time before the Trusted Platform Module (TPM), looming threats from the evolving digital landscape meant that a solution was needed to address the impending risks. In our most recent #TPM video, Former TCG member Stephen Heil, explains how computing advancements resulted

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

Despite the TPM’s modern presence in over 2 billion devices worldwide, its early development was met with skepticism from both governments and organisations. Former TCG member and retired security architect, David Grawrock, addresses how TCG overcame these barriers to kickstart

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

The Trusted Computing Group is always developing and expanding new ideas around the Trusted Platform Module (TPM). But just how important is the TPM to TCG? Stephanie Schultz, MBA tells us more⬇️ You can watch the full video here: bit.ly/4hs5Sxq #TPM25 #TCG

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

As we celebrate 25 years of the Trusted Platform Module (TPM), what could the next 25 years, and beyond, look like for the TPM? TCG Workgroup Chair, Amy Nelson, tells us more. Watch the full video, here: bit.ly/3WVYJNC #TPM25 #TCG #TrustedComputing

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

As a new year unfolds, fresh trends emerge - and the computing landscape is no exception. From AI integration to the rise of quantum computing threats, cybersecurity is evolving rapidly, bringing both new opportunities and challenges. In our latest blog, we explore five key

As a new year unfolds, fresh trends emerge - and the computing landscape is no exception.

From AI integration to the rise of quantum computing threats, cybersecurity is evolving rapidly, bringing both new opportunities and challenges.

In our latest blog, we explore five key
Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

TCG will be attending Security Days Spring 2025 in Tokyo! On March 11, Atsushi Nagata, Marie Ando and Tsukasa Kobayashi from TCG's Japan Regional Forum (JRF), will be leading a workshop on the role that TCG and the TPM plays in the cybersecurity landscape. bit.ly/3XovjrN

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

The widespread adoption of the Trusted Platform Module (TPM) across more than a billion devices was largely driven by one key factor: the dedication of TCG members. As we mark the TPM’s 25th anniversary, TPM Workgroup Chair, Chris Fenner, highlights the vital role of the TCG

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

As we celebrate the Trusted Platform Module (TPM) turning 25, some of our members take a trip down memory lane to speak about their personal involvement in developing the TPM. In our latest TPM video, Co-Chair of the Infrastructure Work Group, Monty Wiseman, describes his

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

BREAKING: TCG President Joe Pennisi is the cover star of the the latest issue of Intelligent CISO! On the 25th Anniversary of the TPM, Joe delves into the critical role this standard has had in protecting devices, and how it will continue to evolve to meet the future computing

BREAKING: TCG President Joe Pennisi is the cover star of the the latest issue of Intelligent CISO!

On the 25th Anniversary of the TPM, Joe delves into the critical role this standard has had in protecting devices, and how it will continue to evolve to meet the future computing
Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

In our latest #TPM Anniversary video, TPM Co-Chair Brad Litterell acknowledges the work TCG members did in the past to enable the standard to become commonplace within computing, and provides insight into the current activities of the Work Group. You can find the video on our

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

The Trusted Computing Group is delighted to welcome Arm to the Board of Directors, with Dong Wei, MBA appointed as its representative. As a member of the Board, Arm will bring a range of perspectives across different markets and its wide-ranging CPU architecture ecosystem to

The Trusted Computing Group is delighted to welcome Arm to the Board of Directors, with Dong Wei, MBA appointed as its representative. 
 
As a member of the Board, Arm will bring a range of perspectives across different markets and its wide-ranging CPU architecture ecosystem to
Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

Rounding off our TCG Anniversary video series is Joerg Borchert, who reflects on his time as TCG President. Watch the full video and catch up with the rest of the videos from the series here: youtu.be/ZBAf2W0H5b0 #TPM25 #TCG #TrustedComputing

Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

TCG’s most recent Members Meeting opened with an insightful presentation on ‘Trusted Computing Future: Emerging Use Cases and Solutions’, delivered by Ram (Ramki) Krishnan and Ned Smith. A key part of this presentation was the concept of Trusted Confidential Computing (TCC) - a

TCG’s most recent Members Meeting opened with an insightful presentation on ‘Trusted Computing Future: Emerging Use Cases and Solutions’, delivered by Ram (Ramki) Krishnan and Ned Smith. 

A key part of this presentation was the concept of Trusted Confidential Computing (TCC) - a
Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

Edge computing and AI have both proved to be viable and low-latency options for real-time operations. Developments in both have led to the development of Edge AI, which actions time-sensitive tasks locally for reduced bandwidth usage and lower operational overheads. Our

Edge computing and AI have both proved to be viable and low-latency options for real-time operations. 
 
Developments in both have led to the development of Edge AI, which actions time-sensitive tasks locally for reduced bandwidth usage and lower operational overheads.
 
Our
Trusted Computing (@trustedcomputin) 's Twitter Profile Photo

A new research development demonstrates how Trusted Platform Module (TPM) technology can enable vendor-neutral confidential computing — strengthening trust and interoperability across platforms. Building on specifications developed by the Trusted Computing Group (TCG) and

A new research development demonstrates how Trusted Platform Module (TPM) technology can enable vendor-neutral confidential computing — strengthening trust and interoperability across platforms.

Building on specifications developed by the Trusted Computing Group (TCG) and