by Michael Peters | Jan 24, 2025 | Trust
It’s almost impossible to count the number of security breaches that were caused by a leaked password or API key. Secret management in software is a tricky thing to get right. Securely deploying secrets to only the places where they are needed, securely rotating...
by Marcio A. Silva, George Almási, James Bottomley, Lily Sturmann, Michael Peters | Apr 25, 2023 | Trust
Remote attestation answers the (slightly paraphrased) question: “It’s 3pm, do you know what the systems in your data center are doing?” Going with this premise, durable attestation answers a similar question about 3pm yesterday. In this article we describe the...
by Michael Peters | May 13, 2021 | Trust
Modern software is layers upon layers upon layers. Most of us only really work in one or two of those layers but we rely on all of the others below us to keep working. Not only do we rely on their performance and functionality, we rely on them for security. If...