 
              
              TPM – a Powerful, Inexpensive Security Building Block
There are two worlds of computer security – high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques. High-end and specialized systems have the additional protection of “bottom-up” defenses in the form of Hardware Security Modules (HSMs). HSMs sequester secrets […]
Read more →