How Do You Stop Attacks in Their Tracks? | Root of Trust | Intel Business



In this InTechnology video, Tom and Camille chat with Jorge Myszne about Root of Trust and firmware attacks. They dive into how firmware attacks happen, how Root of Trust prevents them from causing damage, and how companies can protect themselves.

Check it out. For more information, previous podcasts, and full versions, visit our website at https://intechnology.intel.com/

#rootoftrust #RoT #firmware

The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the InTechnology podcast on your favorite podcast platforms.

Apple Podcast: https://podcasts.apple.com/il/podcast/intechnology/id1526572021

Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug

Follow our hosts @tommgarrison and Camille @morhardt

Subscribe now to Intel Business on YouTube: http://intel.ly/intelitcenteryt

About Intel Business:
Get all the IT info you need, right here. From data center to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.

Connect with Intel Business:
Visit Intel Business’s WEBSITE: http://intel.ly/itcenter
Follow Intel Business on TWITTER: https://twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: https://www.linkedin.com/showcase/intel-business/
Follow Intel Business on FACEBOOK: https://www.facebook.com/IntelBusiness

How Do You Stop Attacks in Their Tracks? | Root of Trust | Intel Business
https://www.youtube.com/channel/UC9G8DcGtPfHsVEfUTM_TjEw

source

1 thought on “How Do You Stop Attacks in Their Tracks? | Root of Trust | Intel Business”

Leave a Comment