Description
Close your eyes, and imagine a world where booting up your computer wasn’t a susceptibility point for attacks. Imagine a Root of Trust that’s integrated into the CPU. Imagine all of your devices being protected against advanced attacks. Now, what if I told you there’s a cutting-edge processor that’s battle-tested for hardware penetrations, easy to update, and protects credentials, encryption keys, and personal data all at once? What if I told you it was already here, and your systems might already be using it?! Open your eyes, and get ready to be amazed! It’s Pluton, baby! Peter Waxman, Group Program Manager at Microsoft, joins hosts Nic Fillingham and Natalia Godyla in a tell-all about Pluton. Trust us, Pluton is sure to knock your SOCs off (that’s System on a Chip)!
Now that your eyes have been opened to a more secure system, we’d like to ask you to keep the volume down, because you’ve just entered the Library of Threats. While it may sound like inspiration for the next installment of National Treasure, you won’t find Nicolas Cage in this library (at least you shouldn’t). However, you will find Madeline Carmichael, MSTIC’s Threat Intel Librarian, whose movie-worthy title is just as impressive as it sounds. To be honest though, you might not find anyone in the library, as it bears more resemblance to Professor X’s Cerebro than it does your local hardcover sanctuary.
In This Episode, You Will Learn:
What the Pluton Security Processor is and how it was created
The architecture of the Pluton Security Processor
What challenges were faced while bringing the Pluton Security Processor to life
The Root of Trust today vs. The Future with Pluton
The naming systems for threat actors, from periodic elements to volcanoes
Some Questions We Ask:
What differentiates the Pluton Security Processor from previous methodologies?
Why is the Pluton Processor better than what we have used in the past?
What challenges lie ahead with the next steps around Pluton?
What has changed since Pluton was in Xbox to where it is now?
What tools and platforms does a Threat Intel Librarian utilize?
Resources:
Microsoft Pluton Announcement:
https://www.microsoft.com/security/blog/2020/11/17/meet-the-microsoft-pluton-processor-the-security-chip-designed-for-the-future-of-windows-pcs/
Peter’s LinkedIn
https://www.linkedin.com/in/peter-waxman-ba5555/
Madeline’s LinkedIn
https://www.linkedin.com/in/madeline-carmichael-081540b2/
Nic’s LinkedIn
https://www.linkedin.com/in/nicfill/
Natalia’s LinkedIn
https://www.linkedin.com/in/nataliagodyla/
Microsoft Security Blog:
https://www.microsoft.com/security/blog/
See acast.com/privacy for privacy and opt-out information.
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22