 <?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Trusted Computing Group</title>
	<subtitle type="text"></subtitle>

	<updated>2025-12-02T15:12:35Z</updated>

	<link rel="alternate" type="text/html" href="http://trustedcomputinggroup.org/" />
	<id>https://trustedcomputinggroup.org/feed/atom/</id>
	<link rel="self" type="application/atom+xml" href="https://trustedcomputinggroup.org/feed/atom/" />

	
	<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/91-of-businesses-do-not-have-a-roadmap-in-place-to-protect-against-quantum-threats-finds-new-industry-survey/" />

		<id>https://trustedcomputinggroup.org/?p=122944</id>
		<updated>2025-12-02T15:12:35Z</updated>
		<published>2025-12-02T15:12:35Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Press Release" />
		<summary type="html"><![CDATA[<p>Businesses in all industries are extremely vulnerable to quantum computing attacks, with a new report from the Trusted Computing Group (TCG) finding that 91% of security professionals within the USA &#8230; <a href="https://trustedcomputinggroup.org/91-of-businesses-do-not-have-a-roadmap-in-place-to-protect-against-quantum-threats-finds-new-industry-survey/" class="more-link">Continue reading<span class="screen-reader-text"> "91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/91-of-businesses-do-not-have-a-roadmap-in-place-to-protect-against-quantum-threats-finds-new-industry-survey/">91% of businesses do not have a roadmap in place to protect against quantum threats, finds new industry survey</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[How do TCG technologies protect blockchain users?]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-blockchain-users/" />

		<id>https://trustedcomputinggroup.org/?p=122917</id>
		<updated>2025-11-18T15:59:55Z</updated>
		<published>2025-11-18T15:59:55Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>A blockchain is a distributed and decentralized digital ledger of transactions that is distributed across an entire network of computers. The data within the chain is grouped into blocks, and &#8230; <a href="https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-blockchain-users/" class="more-link">Continue reading<span class="screen-reader-text"> "How do TCG technologies protect blockchain users?"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-blockchain-users/">How do TCG technologies protect blockchain users?</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[How do TCG technologies protect digital wallet users?]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-digital-wallet-users/" />

		<id>https://trustedcomputinggroup.org/?p=122867</id>
		<updated>2025-11-04T15:02:54Z</updated>
		<published>2025-11-04T15:02:54Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>Across the globe, digital wallets – software-based systems residing on smartphones, smart watches and other devices – are now commonly used to store payment information, such as debit and credit &#8230; <a href="https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-digital-wallet-users/" class="more-link">Continue reading<span class="screen-reader-text"> "How do TCG technologies protect digital wallet users?"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/how-do-tcg-technologies-protect-digital-wallet-users/">How do TCG technologies protect digital wallet users?</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[Using a TPM to bolster anti-cheat measures in gaming]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/using-a-tpm-to-bolster-anti-cheat-measures-in-gaming/" />

		<id>https://trustedcomputinggroup.org/?p=122792</id>
		<updated>2025-09-30T14:18:56Z</updated>
		<published>2025-09-30T14:18:56Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>When it comes to the use of Trusted Platform Modules (TPMs), the benefits for protecting devices such as computers and networks is well known. However, one novel update from the &#8230; <a href="https://trustedcomputinggroup.org/using-a-tpm-to-bolster-anti-cheat-measures-in-gaming/" class="more-link">Continue reading<span class="screen-reader-text"> "Using a TPM to bolster anti-cheat measures in gaming"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/using-a-tpm-to-bolster-anti-cheat-measures-in-gaming/">Using a TPM to bolster anti-cheat measures in gaming</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon]]></title>
		<link rel="alternate" type="text/html" href="https://www.secedge.com/news/secedge-joins-tcg-approved-vendors-with-sec-tpm-a-groundbreaking-tpm-2-0-solution-for-arm-trustzone-enabled-silicon/#new_tab" />

		<id>https://trustedcomputinggroup.org/?p=122788</id>
		<updated>2025-09-30T01:34:36Z</updated>
		<published>2025-09-30T01:34:36Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Member Releases" />
		<summary type="html"><![CDATA[<p>SEC-TPM™ stands as an industry first, pioneering security in Edge AI and enhancing application data privacy for confidential computing AI security and data privacy have received a major boost today &#8230; <a href="https://www.secedge.com/news/secedge-joins-tcg-approved-vendors-with-sec-tpm-a-groundbreaking-tpm-2-0-solution-for-arm-trustzone-enabled-silicon/#new_tab" class="more-link">Continue reading<span class="screen-reader-text"> "SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon"</span></a></p>
<p>The post <a href="https://www.secedge.com/news/secedge-joins-tcg-approved-vendors-with-sec-tpm-a-groundbreaking-tpm-2-0-solution-for-arm-trustzone-enabled-silicon/#new_tab">SecEdge Joins TCG-Approved Vendors with SEC-TPM™, a Groundbreaking TPM 2.0 Solution for Arm® TrustZone™-Enabled Silicon</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[TCG and OST2 Expands Curriculum for  Developing Cybersecurity Experts in Trusted Computing]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/tcg-and-ost2-expands-curriculum-for-developing-cybersecurity-experts-in-trusted-computing/" />

		<id>https://trustedcomputinggroup.org/?p=122776</id>
		<updated>2025-09-23T04:17:18Z</updated>
		<published>2025-09-23T04:17:11Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Press Release" />
		<summary type="html"><![CDATA[<p>Software developers and students interested in device security will be given the chance to enhance their cybersecurity skills and the security of devices through a new technical security training program &#8230; <a href="https://trustedcomputinggroup.org/tcg-and-ost2-expands-curriculum-for-developing-cybersecurity-experts-in-trusted-computing/" class="more-link">Continue reading<span class="screen-reader-text"> "TCG and OST2 Expands Curriculum for  Developing Cybersecurity Experts in Trusted Computing"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/tcg-and-ost2-expands-curriculum-for-developing-cybersecurity-experts-in-trusted-computing/">TCG and OST2 Expands Curriculum for  Developing Cybersecurity Experts in Trusted Computing</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[Ensuring cyber resilience from the hardware up]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/ensuring-cyber-resilience-from-the-hardware-up/" />

		<id>https://trustedcomputinggroup.org/?p=122774</id>
		<updated>2025-09-23T04:12:05Z</updated>
		<published>2025-09-17T04:11:29Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>Today’s security models are increasingly reliant on dedicated security processors to perform critical measurements within devices and systems. In many cases, a Trusted Platform Module (TPM) is integrated to handle &#8230; <a href="https://trustedcomputinggroup.org/ensuring-cyber-resilience-from-the-hardware-up/" class="more-link">Continue reading<span class="screen-reader-text"> "Ensuring cyber resilience from the hardware up"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/ensuring-cyber-resilience-from-the-hardware-up/">Ensuring cyber resilience from the hardware up</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[How the TPM will protect computing devices over the next 25 years]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/how-the-tpm-will-protect-computing-devices-over-the-next-25-years/" />

		<id>https://trustedcomputinggroup.org/?p=122730</id>
		<updated>2025-08-29T15:09:45Z</updated>
		<published>2025-08-27T15:09:30Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>In our last blog, we looked at the work done by our members to develop and popularize the Trusted Platform Module (TPM) since its inception. Now, we look to the &#8230; <a href="https://trustedcomputinggroup.org/how-the-tpm-will-protect-computing-devices-over-the-next-25-years/" class="more-link">Continue reading<span class="screen-reader-text"> "How the TPM will protect computing devices over the next 25 years"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/how-the-tpm-will-protect-computing-devices-over-the-next-25-years/">How the TPM will protect computing devices over the next 25 years</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[What is post quantum cryptography, and how is TCG implementing it?]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/what-is-post-quantum-cryptography-and-how-is-tcg-implementing-it/" />

		<id>https://trustedcomputinggroup.org/?p=122710</id>
		<updated>2025-08-14T02:43:29Z</updated>
		<published>2025-08-14T02:43:12Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>In the future, there will soon be a time when someone builds a quantum device powerful enough that it can be used to break the most widely used forms of &#8230; <a href="https://trustedcomputinggroup.org/what-is-post-quantum-cryptography-and-how-is-tcg-implementing-it/" class="more-link">Continue reading<span class="screen-reader-text"> "What is post quantum cryptography, and how is TCG implementing it?"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/what-is-post-quantum-cryptography-and-how-is-tcg-implementing-it/">What is post quantum cryptography, and how is TCG implementing it?</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[How the Reference Integrity Manifest (RIM) delivers secure firmware]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/how-the-reference-integrity-manifest-rim-delivers-secure-firmware/" />

		<id>https://trustedcomputinggroup.org/?p=122615</id>
		<updated>2025-06-24T14:18:34Z</updated>
		<published>2025-06-24T14:03:27Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>When it comes to hacking attempts, it’s not just software and hardware attacks that are on the rise, but the firmware too. Bolstered by the growing reliance we have on &#8230; <a href="https://trustedcomputinggroup.org/how-the-reference-integrity-manifest-rim-delivers-secure-firmware/" class="more-link">Continue reading<span class="screen-reader-text"> "How the Reference Integrity Manifest (RIM) delivers secure firmware"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/how-the-reference-integrity-manifest-rim-delivers-secure-firmware/">How the Reference Integrity Manifest (RIM) delivers secure firmware</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[Reflecting on the TPM: over 25 years of computing security]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/reflecting-on-the-tpm-over-25-years-of-computing-security/" />

		<id>https://trustedcomputinggroup.org/?p=122618</id>
		<updated>2025-06-24T14:13:25Z</updated>
		<published>2025-06-09T14:10:29Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>In our latest blog covering the 25th anniversary of the TPM, we hear from TCG legends Dave Grawrock, Steve Hanna, Monty Wiseman and Dave Challener on the development of the &#8230; <a href="https://trustedcomputinggroup.org/reflecting-on-the-tpm-over-25-years-of-computing-security/" class="more-link">Continue reading<span class="screen-reader-text"> "Reflecting on the TPM: over 25 years of computing security"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/reflecting-on-the-tpm-over-25-years-of-computing-security/">Reflecting on the TPM: over 25 years of computing security</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[Securing Edge AI through trusted computing]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/securing-edge-ai-through-trusted-computing/" />

		<id>https://trustedcomputinggroup.org/?p=122560</id>
		<updated>2025-09-30T01:32:36Z</updated>
		<published>2025-05-22T05:51:02Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>In today’s computing landscape, edge computing has proven to be a highly viable and low-latency option for real-time operations. By leveraging local compute devices – such as IoT nodes, small &#8230; <a href="https://trustedcomputinggroup.org/securing-edge-ai-through-trusted-computing/" class="more-link">Continue reading<span class="screen-reader-text"> "Securing Edge AI through trusted computing"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/securing-edge-ai-through-trusted-computing/">Securing Edge AI through trusted computing</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[TCG welcomes Arm as new board member to make  trusted computing a core pillar of system architecture]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/tcg-welcomes-arm-as-new-board-member-to-make-trusted-computing-a-core-pillar-of-system-architecture/" />

		<id>https://trustedcomputinggroup.org/?p=122539</id>
		<updated>2025-05-06T21:33:51Z</updated>
		<published>2025-05-06T21:33:51Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Press Release" />
		<summary type="html"><![CDATA[<p>The Trusted Computing Group (TCG) has announced Arm has today joined the Board of Directors, with Dong Wei appointed as its representative. The ubiquitous Arm compute platform touches 100 percent &#8230; <a href="https://trustedcomputinggroup.org/tcg-welcomes-arm-as-new-board-member-to-make-trusted-computing-a-core-pillar-of-system-architecture/" class="more-link">Continue reading<span class="screen-reader-text"> "TCG welcomes Arm as new board member to make  trusted computing a core pillar of system architecture"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/tcg-welcomes-arm-as-new-board-member-to-make-trusted-computing-a-core-pillar-of-system-architecture/">TCG welcomes Arm as new board member to make  trusted computing a core pillar of system architecture</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[Enhancing Data Security and Residency through Trusted Confidential Computing]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/enhancing-data-security-and-residency-through-trusted-confidential-computing/" />

		<id>https://trustedcomputinggroup.org/?p=122553</id>
		<updated>2025-05-20T14:05:01Z</updated>
		<published>2025-05-05T18:03:58Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>In an era of increasing cyber threats and stringent data protection regulations, ensuring data security throughout its lifecycle is paramount. Governments and enterprises alike are enforcing data residency laws that &#8230; <a href="https://trustedcomputinggroup.org/enhancing-data-security-and-residency-through-trusted-confidential-computing/" class="more-link">Continue reading<span class="screen-reader-text"> "Enhancing Data Security and Residency through Trusted Confidential Computing"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/enhancing-data-security-and-residency-through-trusted-confidential-computing/">Enhancing Data Security and Residency through Trusted Confidential Computing</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[Trusted Computing Group Storage Work Group Call For Participation]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/trusted-computing-group-storage-work-group-call-for-participation/" />

		<id>https://trustedcomputinggroup.org/?p=122489</id>
		<updated>2025-04-08T14:36:47Z</updated>
		<published>2025-04-04T18:34:36Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Press Release" />
		<summary type="html"><![CDATA[<p>Call For Participation! The TCG Storage Work Group (WG) is starting work to define a new feature set specification, the Hard Cryptographic Purge feature set specification, to enable hardware-based cryptographic &#8230; <a href="https://trustedcomputinggroup.org/trusted-computing-group-storage-work-group-call-for-participation/" class="more-link">Continue reading<span class="screen-reader-text"> "Trusted Computing Group Storage Work Group Call For Participation"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/trusted-computing-group-storage-work-group-call-for-participation/">Trusted Computing Group Storage Work Group Call For Participation</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[Trusted Computing Future: Emerging Use Cases and Solutions]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/trusted-computing-future-emerging-use-cases-and-solutions/" />

		<id>https://trustedcomputinggroup.org/?p=122425</id>
		<updated>2025-03-14T03:07:33Z</updated>
		<published>2025-03-07T16:19:21Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" /><category scheme="http://trustedcomputinggroup.org/" term="Presentation" /><category scheme="http://trustedcomputinggroup.org/" term="Video" />
		<summary type="html"><![CDATA[<p>The following presentation was presented at the 2025 TCG February Members Meeting in Austin, USA. This presentation was by Ramki Krishnan (Intel), Ned Smith (Intel), Diego Lopez (Telefonica), and Ghada &#8230; <a href="https://trustedcomputinggroup.org/trusted-computing-future-emerging-use-cases-and-solutions/" class="more-link">Continue reading<span class="screen-reader-text"> "Trusted Computing Future: Emerging Use Cases and Solutions"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/trusted-computing-future-emerging-use-cases-and-solutions/">Trusted Computing Future: Emerging Use Cases and Solutions</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[The attacks of 2024, and how trusted computing could’ve helped]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/the-attacks-of-2024-and-how-trusted-computing-couldve-helped/" />

		<id>https://trustedcomputinggroup.org/?p=122519</id>
		<updated>2025-04-22T14:05:54Z</updated>
		<published>2025-02-22T14:04:33Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>With cyber-attacks growing in both volume and complexity each year, it should come as no surprise to hear 2024 was marked by many significant, often devastating attacks and hacks. For &#8230; <a href="https://trustedcomputinggroup.org/the-attacks-of-2024-and-how-trusted-computing-couldve-helped/" class="more-link">Continue reading<span class="screen-reader-text"> "The attacks of 2024, and how trusted computing could’ve helped"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/the-attacks-of-2024-and-how-trusted-computing-couldve-helped/">The attacks of 2024, and how trusted computing could’ve helped</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[Trusted Computing in 2025: The Trends to Expect]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/trusted-computing-in-2025-the-trends-to-expect/" />

		<id>https://trustedcomputinggroup.org/?p=122364</id>
		<updated>2025-02-04T15:31:17Z</updated>
		<published>2025-02-04T18:30:41Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Blog" />
		<summary type="html"><![CDATA[<p>Every year, the computing landscape evolves as a result of new technological innovations and evolving threat tactics. With the rise of new technologies and shifting attack methods, it may be &#8230; <a href="https://trustedcomputinggroup.org/trusted-computing-in-2025-the-trends-to-expect/" class="more-link">Continue reading<span class="screen-reader-text"> "Trusted Computing in 2025: The Trends to Expect"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/trusted-computing-in-2025-the-trends-to-expect/">Trusted Computing in 2025: The Trends to Expect</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[New TPM specification redefines firmware security for connected devices]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/new-tpm-specification-redefines-firmware-security-for-connected-devices/" />

		<id>https://trustedcomputinggroup.org/?p=122362</id>
		<updated>2025-02-04T15:24:23Z</updated>
		<published>2025-02-04T15:24:23Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Press Release" />
		<summary type="html"><![CDATA[<p>Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM 2.0 specification from the Trusted Computing Group (TCG). Manufacturers attach &#8230; <a href="https://trustedcomputinggroup.org/new-tpm-specification-redefines-firmware-security-for-connected-devices/" class="more-link">Continue reading<span class="screen-reader-text"> "New TPM specification redefines firmware security for connected devices"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/new-tpm-specification-redefines-firmware-security-for-connected-devices/">New TPM specification redefines firmware security for connected devices</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
		<entry>
		<author>
			<name>TCG Admin</name>
					</author>

		<title type="html"><![CDATA[New computing specification secures sensitive  information while enhancing device performance]]></title>
		<link rel="alternate" type="text/html" href="https://trustedcomputinggroup.org/new-computing-specification-secures-sensitive-information-while-enhancing-device-performance/" />

		<id>https://trustedcomputinggroup.org/?p=122335</id>
		<updated>2025-02-04T15:19:58Z</updated>
		<published>2025-01-12T15:16:52Z</published>
		<category scheme="http://trustedcomputinggroup.org/" term="Press Release" /><category scheme="http://trustedcomputinggroup.org/" term="Uncategorized" />
		<summary type="html"><![CDATA[<p>Sensitive data and device operations can now be kept safe in a more secure environment, thanks to the new specification launched by the Trusted Computing Group (TCG). Previously, the majority &#8230; <a href="https://trustedcomputinggroup.org/new-computing-specification-secures-sensitive-information-while-enhancing-device-performance/" class="more-link">Continue reading<span class="screen-reader-text"> "New computing specification secures sensitive  information while enhancing device performance"</span></a></p>
<p>The post <a href="https://trustedcomputinggroup.org/new-computing-specification-secures-sensitive-information-while-enhancing-device-performance/">New computing specification secures sensitive  information while enhancing device performance</a> appeared first on <a href="https://trustedcomputinggroup.org">Trusted Computing Group</a>.</p>
]]></summary>

		
			</entry>
	</feed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching using Disk (Request-wide modification query)

Served from: trustedcomputinggroup.org @ 2026-01-21 10:54:31 by W3 Total Cache
-->