{"version":"1.0","provider_name":"AMI","provider_url":"https:\/\/www.ami.com","title":"US Policymakers&#8217; Research Foundation Calls Out the Need to Drive Firmware Security in Standards and Regulations","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"EtrXdEJOx8\"><a href=\"https:\/\/www.ami.com\/resource\/us-policymakers-research-foundation-calls-out-the-need-to-drive-firmware-security-in-standards-and-regulations\/\">US Policymakers&#8217; Research Foundation Calls Out the Need to Drive Firmware Security in Standards and Regulations<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ami.com\/resource\/us-policymakers-research-foundation-calls-out-the-need-to-drive-firmware-security-in-standards-and-regulations\/embed\/#?secret=EtrXdEJOx8\" width=\"600\" height=\"338\" title=\"&#8220;US Policymakers&#8217; Research Foundation Calls Out the Need to Drive Firmware Security in Standards and Regulations&#8221; &#8212; AMI\" data-secret=\"EtrXdEJOx8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ami.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/04\/AMI-to-Showcase-Platform-Root-of-Trust-on-Arm\u00ae-based-Server.jpg","thumbnail_width":1200,"thumbnail_height":722,"description":"Firmware is all around us \u2013 from your car to airport kiosks and power grids, nearly all technology is powered by firmware, and that firmware is vulnerable to cyberattacks. Because of this, firmware attacks are on the rise and can be much more dangerous than Operating System (OS) attacks because the firmware is invisible to [&hellip;]"}