Compromised Firmware Lies, Spies, Steals and Destroys
How can you attest to the integrity of hardware and ensure you have not been penetrated at the deepest level? We’ll look at real-world examples of how little-known threats of compromised firmware can impact users, businesses, and governments. These threats are everywhere and go largely unnoticed until it’s too late. From supply chain to cloud, take a deep dive and learn ways to identify and protect against bad actors that take advantage of firmware vulnerabilities.