While emerging technologies like Internet of Things (IoT) and machine-to-machine (M2M) communications are heralding in exciting new products, they’re equally raising security concerns as the points of access to a system continue to grow, and devices fail to comply to basic security best practices, such as demanding strong passwords, using encrypted data transmissions, and restricting access of user information.

This blog explains the commonly used hardware security primitives, Physical Unclonable Functions (PUF),True Random Number Generators (TRNG) and Trusted Platform Modules (TPM)

Read More