Published on Saturday 12th Jul, 2025
How can you know your phone, PC motherboard or home devices were not compromised before any software was even installed on them? From dubious 'management engines' to exploding pagers, hardware tampering, malicious manufacture and treacherous (defective by design) computing is becoming more common. We talk to Dr. Basel Halak about hardware supply chain verification, tampering countermeasures and how hardware security can work for the end-user too, for example protecting the contents of your stolen phone.
Categories:
Audio Video
#050 | S6 | In The Chair | Hardware Security with Dr. Basel Halak
Saturday 12th Jul, 2025
#049 | S6 | On The Go | UK National Cyber Security Show
Friday 27th Jun, 2025
#048 | S6 | In The Chair | Positive Security Thinking
Thursday 19th Jun, 2025
#047 | S5 | In The Chair | What is the SASIG?
Thursday 08th May, 2025
More Episodes
LinkedIn
BlueSky
Facebook