Blog

What is a Trusted Computing Base?

What does it mean for a system or component to be “trusted” in the world of computer systems?  And why does it matter? In this post, we’ll provide an overview of what a Trusted Computing Base (TCB) is and provide a framework for how to evaluate a TCB’s security....

read more

What Can You Do with a TPM?

Modern software is layers upon layers upon layers. Most of us only really work in one or two of those layers but we rely on all of the others below us to keep working. Not only do we rely on their performance and functionality, we rely on them for security. If we're...

read more