Most experts agree that in order to secure a hardware product and certify its origin and trustworthiness, a hardware secure element is necessary. Software cannot effectively secure hardware.
The authentication market is now expanding to include the Internet of Things; this, after being widely used in brand protection, IT security and Trusted Platform Module (TPM) solutions.
Read the full article on IoT Times:
https://iot.eetimes.com/why-software-cannot-effectively-secure-hardware/
Sign up to our newsletter to receive the latest Cities of the Future news. You can also follow us on Twitter and Facebook.