• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybersecurity

How hardware can protect protect modern computer from emerging threats

The cybers risk turmoil is made worse by the fact that employees are working remotely, outside of corporate networks.

Gert Van de VenbyGert Van de Ven
November 25, 2022
in Articles, Cybersecurity
0
How hardware can protect protect modern computer from emerging threats

The corporate habits shift toward hybrid or remote work became obvious and widespread with the COVID-19 crisis. But what was an emergency response to the global economy disruption is here to stay. Remote work aggravate existing weakness in organization’s networks while coping with a steadily rise of cyber threats. With laptop and computer out of the corporate shelter, they became a particularly interesting target for cybercriminal.

According to Vedere Labs, about 63% of all devices affected by a vulnerability are computer with a 9/10 average CVSS score.

Endpoint and Supply chain are organization weakspot

In this context of increasing pressure on endpoint, Unified Extensible Firmware Interface (UEFI) attacks are rising. As a low-level firmware, it allows attacker to achieve greater persistence and defense evasion to install their malware. Furthermore, digital transformations and industry 4.0 are adding millions of new devices to the potential attack surface.

In addition to the endpoint pressure, organizations are also hit in another vulnerable area: software supply chain attack. Enterprises depend on software stacks to gain access to other components in their software stacks, and those stacks are vulnerable to supply chain attacks, such as the SolarWinds or the Kaseya attacks.

A multilayer approach to security, which protects hardware and software at every level, can be quite effective at countering these threats and others in the future. Because an layered approach is not dependent on any one component for security, it can go a long way in countering these threats and others.

Adding hardware layer of security

A device’s layers of software and hardware can be safeguarded using multilayered security. In addition to safeguarding devices against outside network, service, and software threats, multilayered security helps safeguard against attacks that originate from the outside. This approach is particularly effective for protecting the devices employees use outside of the office.

Hardware multi-layered security offers three main benefits to protect user information and identities:

  • Preventing threats from compromising the operating system by securing it below the operating system level with dedicated security hardware.
  • Combating attacks that bypass software security by using hardware encryption.
  • Preventing malicious actors from exploiting security holes between hardware and software by integrating hardware and software.
  • Manage memory manipulation at the hardware level to prevent memory attacks such as buffer overflow.

Hardware and software vendors must work closely together to provide the coordination necessary for robust, multi-layered security. AMD and Microsoft are an example of this coordination, and they work together to provide the best hardware and software solutions to customers.

How Hardware and software vendors collaborate for cybersecurity

Working together, AMD and Microsoft have integrated hardware and software security features to protect any kind of endpoint.

The Pluton chip-to-cloud security technology created by Microsoft is used on Windows 11 PCs to protect user identities, data and applications. The Pluton chip is the silicon-based hardware root of trust for the Windows ecosystem. Microsoft’s Pluton chip works in concert with the AMD Ryzen PRO 6000 Series processor’s. Or with AMD Secure Processor (ASP), a dedicated security coprocessor, to protect user identities and data. In addition to protecting system integrity by authenticating the firm’s initial firmware, it also increases system integrity by authenticating the initial firmware loaded on PCs.

AMD Shadow Stack control flow protection thwarts malware that attempts to redirect the steps taken by legitimate software. This hardware-based protection detects anomalies by comparing stack or subroutine sequence information with a copy stored in hardware.

AMD Ryzen PRO processors let you encrypt the entire system memory, providing more comprehensive protection than application-level encryption. Each time the computer boots up, a unique key creates to encrypt the memory, preventing attackers from accessing passwords and other sensitive information stored in memory, even if they gain physical access to the system.

 

Tags: Buffer OverflowCollaborationFirmwareHardwareIOTSoftware Security

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}