InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

TPMs Can't Be Hacked - Cybersecurity Mythbusters

Presented by

Patrick McBride and Jasson Casey at Beyond Identity

About this talk

A TPM (or Trusted Platform Module) is an industry standard component that protects keys that can be used for authentication. The important property of TPMs is that the private key is protected from even the lowest level of the operating system. This property protects a TPM key from phishing and other attacks that may expose it. It is available on most PCs, networking equipment, and industrial controllers. But can a TPM be hacked? Our Security Architect, Monty Wiseman is with us to help us find out! Join Beyond Identity's CMO, Patrick McBride, and CTO, Jasson Casey, as they try to bust this latest myth! Follow Beyond Identity: twitter.com/beyondidentity linkedin.com/company/beyond-identity-inc Website: beyondidentity.com
Beyond Identity

Beyond Identity

955 subscribers27 talks
Zero Trust Authentication
Zero Trust Authentication protecting your workforce, customers, and developers with passwordless, phishing-resistant MFA! www.beyondidentity.com
Related topics