The news of the past year hasn’t been encouraging for those who wished cyberspace would avoid becoming a geopolitical battleground. It is now confirmed that national governments are exploiting weaknesses in network infrastructure and end point security to conduct cyber surveillance and disrupt the operations of networks and other critical infrastructure. But with QorIQ platforms, embedded systems designers can do more than throw up their hands and surrender. QorIQ products include features like secure boot, which OEMs can use to make it significantly harder for their systems to be hacked. This session will briefly describe the threats which the Trust Architecture is intended to address and provide an overview the features and methods it uses to resist hacks.
Presented by Geoff Waters
Presented at DwF Silicon Valley - March 26, 2015
Session ID: AMF-SNT-T1041