Most trusted computing group tnc related news are at:

trustedcomputinggroup.org – Trusted Computing Group - Home

TPM Security Overview: Defining the Benefits of TPM Devices 26 Aug 2013 | 05:00 am

By Michael Cobb, Application Security Information security is awash with a variety of attacks aimed at everything from Web browsers to authentication processes to Adobe software. Defending such a lar...

The Pressing Need to Improve Endpoint Visibility for Information Security 26 Aug 2013 | 05:00 am

Author: Jon Oltsik In a recent ESG research project, 315 security professionals working at enterprise organizations (i.e., more than 1,000 employees) were asked to identify their organizations’ endpo...

More trusted computing group tnc related news:

TCG Members to Talk Security Implementation and Evolution at Trusted Computing Conference trustedcomputinggroup.org 26 Aug 2013 | 05:00 am

PORTLAND, Ore., Aug. 26, 2013 - Trusted Computing Group (TCG) members will provide attendees of the Trusted Computing Conference, Sept. 9-12, with a look at the billions of trusted endpoints and fresh...

Trusted Computing Group Comments on Trusted Platform Module Security Following Black Hat Presentation trustedcomputinggroup.org 31 Jul 2013 | 05:00 am

PORTLAND, Ore., August 1, 2013 – Trusted Computing Group (TCG) today commented on a presentation from MITRE Corp. given July 31, 2013 at the Black Hat Conference. The presentation by John Butterwo...

Trusted Computing Group Members to Talk Standards-Based Data Protection, Security at Flash Memory Summit trustedcomputinggroup.org 29 Jul 2013 | 05:00 am

What:        Members of the Trusted Computing Group will participate in sessions at the August 13-15 Flash Memory Summit. In the Security track, organized by Michael Willett o...

Recently parsed news:

Recent keywords:

Recent searches: