Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of malware. But recognition of the importance of hardware security—upon which all software security is built—is (thankfully) also growing. Established hardware security standards such as Secure Boot and Trusted Platform Module (TPM) ensure that computer systems aren’t tampered with or get compromised during bootup. Hardware-based encryption is widely used to protect data on hard drives and … More
The post Security beyond software: The open source hardware security evolution appeared first on Help Net Security.