You might not be immediately familiar with the term “hardware rooted security.” But that particular functionality is likely part of your cybersecurity future. Especially your mobile computing future.
Traditional desktop and notebook PCs used in government probably have hardware rooted security, but not smartphones and tablets. The more these latter devices come into enterprise use, the more critical it becomes for them to have it. And so […]