GUEST ESSAY: The case for leveraging hardware to shore up security — via a co-processor
The Last Watchdog
MARCH 31, 2022
Data privacy breaches expose sensitive details about customers, staff, and company financials. Seeing the flaws continue year after year, the industry began linking authentication of valid software components to the underlying hardware, or the “root of trust”.
Let's personalize your content