In this InTechnology video, Tom and Camille chat with Jorge Myszne about Root of Trust and firmware attacks. They dive into how firmware attacks happen, how Root of Trust prevents them from causing damage, and how companies can protect themselves.
Check it out. For more information, previous podcasts, and full versions, visit our website at https://intechnology.intel.com/
#rootoftrust #RoT #firmware
The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the InTechnology podcast on your favorite podcast platforms.
Apple Podcast: https://podcasts.apple.com/il/podcast/intechnology/id1526572021
Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug
Follow our hosts @tommgarrison and Camille @morhardt
Subscribe now to Intel Business on YouTube: http://intel.ly/intelitcenteryt
About Intel Business:
Get all the IT info you need, right here. From data center to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.
Connect with Intel Business:
Visit Intel Business’s WEBSITE: http://intel.ly/itcenter
Follow Intel Business on TWITTER: https://twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: https://www.linkedin.com/showcase/intel-business/
Follow Intel Business on FACEBOOK: https://www.facebook.com/IntelBusiness
How Do You Stop Attacks in Their Tracks? | Root of Trust | Intel Business
https://www.youtube.com/channel/UC9G8DcGtPfHsVEfUTM_TjEw
source
Just bought a 12700kf never got my mw2 code 🙁