GUEST ESSAY: The case for leveraging hardware to shore up security — via a co-processor
The Last Watchdog
MARCH 31, 2022
Security software may have been a satisfactory product at the turn of the century, but despite massive levels of investment, many experts now realize that it is not adequate for dealing with contemporary threats. This approach allows for compromised software to be identified during the authentication process.
Let's personalize your content