AMI Response for Intel® Management Engine Security Bulletin

AMI Response for Intel® Management Engine Security Bulletin

AMI response for the INTEL-SA-00086 Security Bulletin for Intel® Management Engine AMI is committed to providing the highest level of security in our firmware offerings. With our BIOS and BMC firmware offerings deployed on a majority of computing systems across the...
A Bad Case of Bluebug: Mitigating Risks of Bluetooth Attacks

A Bad Case of Bluebug: Mitigating Risks of Bluetooth Attacks

Bluetooth is a technology that has been around for awhile now. It uses high-speed, short-range radio frequency communication so devices, such as laptops, keyboards, cell phones, headsets, speakers and smart watches, can create a network and transfer data between the...
EC Use Cases

EC Use Cases

Recently we covered the basics of one of our acronyms from our Acronym Soup: EC. If you remember the blog post, you will know that EC stands for embedded controllers, which are microcontrollers located on the motherboard. Embedded controllers serve many purposes when...
What is EC?

What is EC?

Earlier this month, we introduced you to some of the acronyms common in our industry and the concept of Acronym Soup. Going off of our Acronym Soup, we’ll be taking a deeper look at what an EC is. You may have seen the acronym floating around and you may be...
What is a Plugfest?

What is a Plugfest?

If you keep up with AMI, other IBVs and technology companies, you may have heard the term “plugfest” popping up every so often. AMI happens to plan, host, sponsor and attend various plugfests throughout the year and you may be wondering, what is a...
Be Proactive About Firmware Security!

Be Proactive About Firmware Security!

Firmware is everywhere; in every system and nearly every technology device we use on a daily basis – clearest example would be computers/laptops. Firmware is also highly vulnerable to malware attacks, where hackers corrupt the firmware to create persistent...