Like the burglar who ignores the well-lit front entrance of a marked house and instead enters through an unlocked backdoor, cyber hackers looking to penetrate defense systems are choosing the path of least resistance. They tiptoe around well-fortified perimeter securities to attack a less conspicuous — and often less secure — point of entry: server firmware.
For years, defense agencies have emphasized the value of a defense-in-depth approach to security. But often such efforts overlook the vulnerabilities at the firmware level. Download this resource to learn how the DoD is using root of trust to help stay secure and explore tips for success that you can bring back to your agency.
Sponsored by Affigent and HPE
8251 Greensboro Drive, Suite 510, McLean, VA 22102
CA: Do Not Sell My Personal Info