Cyber Security: Securing Edge Devices7-page article by Iaian Deuchars on hardware cyber security, examining possible approaches an attacker can take and describing the features within active network equipment to prevent their success.
Download en PDF