Watch the Webcast: How to Secure Network Equipment Against Attacks

Read The Survey Report

What Embedded and IoT Developers Think About IoT Security: Survey Report

TCG Sponsors New Podcast Series with Embedded Computing Design: Embedded Insiders – Listen Now

What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data with Stacy Cannady of Cisco Systems and Rich Nass of Embedded Computing Design/OpenSystemsMedia – Recorded Webcast and Survey Report

The explosion of intelligent connected devices, or the Internet of Things (IoT), presents a massive expansion of the “attack surface” hackers can target. Many of these devices are difficult or impossible to access, impractical to reboot for security updates, or poorly managed – and most embedded and IoT devices were not designed with security in mind.

For embedded and IoT developers and designers, security should not be an afterthought. After all, your device likely will interface with other devices over a network and likely will contain and communicate data that should not fall into the wrong hands.

Trusted Computing Group, with its long experience in enterprise security, offers a standards-based approach to securing embedded and IoT systems at their foundation. This base security can include securing secrets such as keys, certificates, and passwords; helping prevent malware; and ensuring integrity and identity.

Watch the Recorded Webcast

 

Learn more here:

What Embedded and IoT Developers Think About IoT Security: Survey Report

Webcast: What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data

Architects Guide: IoT Security

Guidance for Securing IoT Using TCG Technology

Securing the Internet of Things Infographic

Webcast: Securing IoT Endpoints, Networks and the Cloud

Webcast: Protecting Intellectual Property in the IoT with Trusted Computing

Demo: Securing IoT with Trusted Computing

 

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More