by Andrew Toth, Luke Hinds | Jun 25, 2019 | Trust
As people move workloads to shared and public cloud environments, what methods are available to attest their environment has not been tampered with? Is there a good way to use a standardized cryptographic module to do remote attestation, trusted system boot, and so...