Webinar: Using the TPM to Solve Today’s Most Urgent Cybersecurity Problems

The TPM provides a hardware root of trust that anchors security and protects keys, certificates and passwords. (Graphic: Business Wire)

--()--What: The Trusted Computing Group will host a free webinar May 20, 2014, on how to use the TPM, or Trusted Platform Module, to solve today’s cybersecurity problems.

With the recent discovery of the flaw in OpenSSL, Heartbleed, even the least computer-savvy among us has seen the potential threat and damage caused by cybersecurity problems. And Heartbleed is just one of many attacks, breaches, viruses and more that just keep coming.

How can enterprise users best protect against and mitigate many security issues?

This webinar will address a fundamental and key aspect to IT security: the root of trust. Embedded into devices, the root of trust, typically implemented by the TPM, provides a proven, safe foundation for more secure computing.

Learn the key concepts of trusted systems, why they’re critical to establishing security and supporting other solutions, and what is new with the TPM.

When: Tues., May 20, 1:00 p.m. Eastern/10:00 a.m. Pacific.

Where: To get more info or to register for the webinar, go to https://www.brighttalk.com/webcast/7423/109391

Tweet this: Join @TrustedComputin for May 20 webinar on locking down certificates, keys, PWs with root of trust #TPM #heartbleed http://bit.ly/1ttwuBx

Contacts

PR Works, Inc.
Anne Price, 602-330-6495
anne@prworksonline.com

Contacts

PR Works, Inc.
Anne Price, 602-330-6495
anne@prworksonline.com