On Wednesday, three companies that sell products and services aimed at securing corporate computers and data told attendees at the RSA Conference 2003 here that trusted computers would help businesses ...
Why is trust related to computing such a big deal? Imagine if the data on your computer is visible to others. Or, what if others have changed the data on your computer? Trust doesn't only refer to ...
PORTLAND, Ore.--(BUSINESS WIRE)--The Trusted Computing Group (TCG) has announced the availability of the TPM (Trusted Platform Module) 2.0 library specification. TPM 2.0 provides a critical technology ...
Editor's note: This article represents the opinions and views of the author. We occasionally publish articles from industry leaders because we believe readers may find them valuable, but please note ...
Are we serious about combating the threats against our computers, our livelihood and the applications that we write and use everyday? While one way to take the offense is to write better code, I ...
The IT industry is slowly growing up, putting basic building blocks in place to protect data and transactions as our entire society now relies on these foundations being solid. Take SSL / TLS, for ...
Trusted execution environments shield proprietary data against the very cloud providers that host it. See how confidential computing works today. Today’s tech industry needs to always keep a step ...
The Trusted Computing Group (TCG) has a lofty goal -- to give the IT industry a base on which to develop systems that are less prone to attacks and malicious access. The nonprofit industry advisory ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results