When Jann Horn of Google’s Project Zero posted a detailed blog titled “Reading privileged memory with a side-channel,” it set off a firestorm of activity as the post confirmed that secret information inside a computer could be accessed via two different attacks, Meltdown and Spectre. Essentially, both attacks utilize CPU data cache timing to efficiently exploit and leak information from the system. This could lead to – at worst – arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.
Download the CryptoManager Root of Trust RT-610 product brief.
Product brief overview:
- Learn about the RT610 features and offerings
- Understand how the Root of Trust protects against attacks with anti-tamper and security techniques
To learn more about the CryptoManager Root of Trust RT-610, please click here.
File encryption, file system encryption and full disk encryption (FDE) are methods offered by the industry to allow users to protect their data stored on non-volatile storage devices, such as Solid State Disks (SSD). The main feature of FDE is to protect stored system and user date from unauthorized reading, writing, alteration, moving or rolling back. However, extended security features are key to securing FDE implementation.
Download Interac®: Securing Canada’s Mobile Payments to learn how Interac utilizes tokenization technology to combat fraud and stay at the forefront of payments technology.
Case study overview:
- Learn about the customer challenge
- See the results and benefits after implementing tokenization technology
To learn more about the Rambus Token Service Provider, please click here.
The rapid expansion of the cryptocurrency ecosystem demonstrates the power of the blockchain to revolutionize financial services and beyond. Thus, a secure foundation of trust and transparency is needed – starting with a new approach for blockchain implementations. Vaultify Trade provides that secure foundation of trust and transparency.
The blockchain has the potential to touch all aspects of our everyday lives, from buying and trading cryptocurrency, to securing vital healthcare records, to proving that a tomato really is organic. The security challenges, specifically the vulnerability of private keys faced by the cryptocurrency market, prove that before the transformative impact of blockchain technology can be realized, a companion security measure to protect the assets themselves is needed.