What's the point of secure software if you can't trust your CPU?

John Leonard
clock • 4 min read

Modern chip designs make it increasingly difficult for developers to be sure that systems are not compromised, says security expert Joanna Rutkowska

What's the point of developing secure software when the infrastructure it runs on cannot be trusted? That's the question posed by Joanna Rutkowska, security researcher and head of the Invisible ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Apple's iPhone 16 to feature AI chip based on Arm V9

Chips and Components

Apple has already incorporated V9 into its M4 MacBook chips

clock 09 September 2024 • 2 min read
Nationwide and Red Hat partner to scale integration platform

Open Source

New platform more flexible, scalable and resilient

clock 06 September 2024 • 2 min read
Why do you need an AI PC strategy?

Artificial Intelligence

And how do you accelerate it once you have one?

clock 04 September 2024 • 2 min read
Most read
01

Avis notifies customers of data breach

10 September 2024 • 3 min read
03

Apple says iPhone 16 can challenge high-end PCs

10 September 2024 • 4 min read
04
05

In the North Sea, data really is the new oil

10 September 2024 • 5 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Facial recognition brings legal and reputational risks

Ashley Avery, Paolo Sbuttoni and Rachel Griffith
clock 03 September 2024 • 3 min read
SSO is dead: Why the age of zero trust demands secure explicit sign-on

SSO is dead: Why the age of zero trust demands secure explicit sign-on

Single sign-on's cons now outweigh the pros

Al Lakhani
clock 03 September 2024 • 5 min read
Microsoft mandates multi-factor authentication for Azure sign-in

Microsoft mandates multi-factor authentication for Azure sign-in

MFA requirement will be implemented in stages

clock 20 August 2024 • 3 min read