Platform Security Starts at the Root of Trust

Platform Security Starts at the Root of Trust

Tektagon™ XFR ,A Guide to Implementing HRoT with NIST PFR Guidelines Data breaches are increasingly costly as the sophistication and funding (in some instances, state-sponsored) of hackers has increased. The Cost of a Data Breach Report 2021 by IBM states that “2021...
AMI Response for Intel® Management Engine Security Bulletin

AMI Response for Intel® Management Engine Security Bulletin

AMI response for the INTEL-SA-00086 Security Bulletin for Intel® Management Engine AMI is committed to providing the highest level of security in our firmware offerings. With our BIOS and BMC firmware offerings deployed on a majority of computing systems across the...
Patches Give You Security!

Patches Give You Security!

On September 7, 2017, news about one of the biggest security breaches in recent history was exposed to the public. Millions of Americans’ social security numbers, credit card numbers and other personal information were released to unauthorized hackers. People...
Be Proactive About Firmware Security!

Be Proactive About Firmware Security!

Firmware is everywhere; in every system and nearly every technology device we use on a daily basis – clearest example would be computers/laptops. Firmware is also highly vulnerable to malware attacks, where hackers corrupt the firmware to create persistent...