IoT Times: Software Cannot Effectively Secure Hardware
Most experts agree that in order to secure a hardware product and certify its origin and trustworthiness, a hardware secure element is necessary. Software cannot effectively secure hardware.
Published in
1 min readApr 27, 2018
The authentication market is now expanding to include the Internet of Things; this, after being widely used in brand protection, IT security and Trusted Platform Module (TPM) solutions.
Read the full article on IoT Times:
Sign up to our newsletter to receive the latest Cities of the Future news. You can also follow us on Twitter and Facebook.