KEYNOTE 1: Hardware Security is Hard: How Hardware Boundaries Define Platform Security

Nowadays it’s difficult to find any hardware vendor who develops all the components present in their platform. The big piece of it outsourced to OEM’s includes firmware too. That creates additional complexity and limits hardware vendor control under the platform. That creates not only supply chain security risks but also produce security gaps in the […]