How Do You Stop Attacks in Their Tracks? | Root of Trust | Intel Business

134
Intel IT Center20.5 тыс
Опубликовано 23 января 2023, 14:59
In this InTechnology video, Tom and Camille chat with Jorge Myszne about Root of Trust and firmware attacks. They dive into how firmware attacks happen, how Root of Trust prevents them from causing damage, and how companies can protect themselves.

Check it out. For more information, previous podcasts, and full versions, visit our website at intechnology.intel.com

#rootoftrust #RoT #firmware

The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the InTechnology podcast on your favorite podcast platforms.

Apple Podcast: podcasts.apple.com/il/podcast/...

Spotify: open.spotify.com/show/6RN4ATo5...

Follow our hosts @tommgarrison and Camille @morhardt

Subscribe now to Intel Business on YouTube: intel.ly/43XZh6J

About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.

Connect with Intel Business:
Visit Intel Business's WEBSITE: intel.ly/itcenter
Follow Intel Business on TWITTER: twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: linkedin.com/showcase/intel-bu...
Follow Intel Business on FACEBOOK: facebook.com/IntelBusiness

How Do You Stop Attacks in Their Tracks? | Root of Trust | Intel Business
youtube.com/intelbusiness
автотехномузыкадетское