Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/19/51/79/19517980-623d-a101-fa44-1c726ad86c65/mza_12095998176625063391.jpeg/600x600bb.jpg
IT SPARC Cast
John Barger
109 episodes
1 day ago
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Tech News
Technology,
News,
News Commentary
RSS
All content for IT SPARC Cast is the property of John Barger and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Tech News
Technology,
News,
News Commentary
https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1759501883329-bf855fc5-e08d-4da8-8191-12a875cc443d.jpeg
Trusted Execution Environment (TEE) Hardware Attacks
IT SPARC Cast
8 minutes 45 seconds
1 month ago
Trusted Execution Environment (TEE) Hardware Attacks

In this eye-opening episode of IT SPARC Cast - CVE of the Week, John Barger and Lou Schmidt explore a shocking vulnerability that doesn’t exploit code — it exploits hardware. Specifically, they dive into how Intel and AMD’s Trusted Execution Environments (TEEs), once hailed as unbreakable, can be compromised via physical attacks. From voltage glitching to signal probing, these advanced threats are no longer theoretical and could sidestep your most hardened security measures.


The episode highlights real-world methods like side-channel probing, interposers, and even fault injection used to extract secrets directly from servers. If a malicious actor can gain physical access to your systems, all bets are off. Lou breaks down the Heracles attack on both AMD SEV and Intel SGX. The hosts emphasize just how crucial physical access controls, chassis alarms, and access logs really are.


Don’t underestimate your weakest link — your data center lock and key.


⸻


🔗 Social Links (Wrap Up Section):


IT SPARC Cast

@ITSPARCCast on X

https://www.linkedin.com/company/sparc-sales/ on LinkedIn


John Barger

@john_Video on X

https://www.linkedin.com/in/johnbarger/ on LinkedIn


Lou Schmidt

@loudoggeek on X

https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn


Hosted on Acast. See acast.com/privacy for more information.

IT SPARC Cast
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.