FOUR KEYS TO NAVIGATING THE HARDWARE SECURITY JOURNEY

As security technologies have increased in sophistication for both threat actors and enterprises, cyber criminals have expanded their approach to…


As security technologies have increased in sophistication for both threat actors and enterprises, cyber criminals have expanded their approach to focus on targets perceived to be less protected, many of which exist ‘below the operating system’ at the hardware level.

From lone individuals and groups to state-sponsored teams, the threats posed today and in the future are not and will not be confined to end-user or operational systems and will be felt throughout the entire ecosystem, from the first supplier to the final end user in software, hardware, and even the silicon itself.

This research, Four Keys to Navigating your Hardware Security Journey, summarizes the highlights of a long term research initiative begun in late 2019 and concluded in mid-2020.

Learn more about Dell Technologies solutions powered by Intel®

8th November 2021