Star 0

Abstract

The Target breach took place at point-of-sale terminals and not at central servers. Data breaches today are focused on hacking the vulnerable devices in the periphery of the enterprise-smart device, thereby stealing data with trusted privileged access. In this session discover how ARM devices though a weak link in an interconnected enterprise can also be an opportunity to secure its endpoints.