As cybersecurity improves, attackers are seeking new methods to subvert traditional security controls - going below the surface to penetrate vulnerable firmware and hardware components inside today’s servers, laptops and networking equipment. Most organizations lack visibility into this attack surface. They can’t easily see which hardware and firmware components are in their fleet or determine which devices are vulnerable to known threats — much less detect a hidden implant or backdoor. These blind spots allow attackers to subvert traditional security controls and persist undetected, leaving organizations exposed to device tampering, ransomware, and data breaches.
In this presentation, you’ll learn
- What’s at risk under the hood in your devices
- How the threat landscape is changing
- How TrickBot malware locates UEFI vulnerabilities
- Why attackers are targeting firmware
- The importance of addressing supply chain risk
- How to protect devices at scale