Using Hardware-Enabled Trusted Crypto to Thwart Advanced Threats

by John Pescatore
Sept. 1, 2017 0 comments SANS Institute Encryption & Authentication

Barely a week goes by without a media report of yet another major cybersecurity incident. As of July 21, the Identity Theft Resource Center reports there had been 436 breaches in 2015, exposing more than 135 million records.1 Several common security failures have enabled these attacks to cause high levels of business damage, including the following: