The "Trusted Computing" technologies promoted by major IT companies such as Microsoft and IBM could have negative consequences for customers and rival software makers, according to security experts.
Update Dec. 21, 2013: Developments this week support the notion that the NSA is seeking to compromise security systems, especially crypto systems. First, this report from Reuters claims that RSA, the ...
On Wednesday, three companies that sell products and services aimed at securing corporate computers and data told attendees at the RSA Conference 2003 here that trusted computers would help businesses ...
Why is trust related to computing such a big deal? Imagine if the data on your computer is visible to others. Or, what if others have changed the data on your computer? Trust doesn't only refer to ...
In a discussion chaired Derek Brink, VP and research fellow from the Aberdeen Group, the panel provided a brief crash course on the concept of ‘trusted computing’ and examined reasons why industry has ...
The Trusted Computing Group (TCG) is a global organization that develops open security standards and specifications based on root of trust enabling secure interoperable systems and networks across ...
Are we serious about combating the threats against our computers, our livelihood and the applications that we write and use everyday? While one way to take the offense is to write better code, I ...
PORTLAND, Ore.--(BUSINESS WIRE)--The Trusted Computing Group (TCG) has announced the availability of the TPM (Trusted Platform Module) 2.0 library specification. TPM 2.0 provides a critical technology ...
ITworld.com – David Geer recently spoke with Steven Sprague, one of the original founders of the Trusted Computing Group, a nonprofit forum to develop open standards for hardware-enabled trusted ...