Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM 2.0 specification from the Trusted Computing Group (TCG). Manufacturers attach a Trusted Platform Module (TPM) to a device to help users and administrators authenticate its identity, to generate and store encryption keys, and to ensure platform integrity. Before the TPM specification was updated, users and administrators could only assume the TPM was working correctly because … More
The post TPM 2.0: The new standard for secure firmware appeared first on Help Net Security.