{"version":"1.0","provider_name":"AMI","provider_url":"https:\/\/www.ami.com","title":"Securing Arm\u00ae-based Servers with Platform Firmware Resiliency","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"slP2HWMlv8\"><a href=\"https:\/\/www.ami.com\/resource\/securing-arm-based-servers-with-platform-firmware-resiliency\/\">Securing Arm\u00ae-based Servers with Platform Firmware Resiliency<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ami.com\/resource\/securing-arm-based-servers-with-platform-firmware-resiliency\/embed\/#?secret=slP2HWMlv8\" width=\"600\" height=\"338\" title=\"&#8220;Securing Arm\u00ae-based Servers with Platform Firmware Resiliency&#8221; &#8212; AMI\" data-secret=\"slP2HWMlv8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ami.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/04\/AMI-to-Showcase-Platform-Root-of-Trust-on-Arm\u00ae-based-Server.jpg","thumbnail_width":1200,"thumbnail_height":722,"description":"In a February 2022 supply chain security report issued by the Department of Homeland Security, platform firmware was referred to as, \u201cone of the stealthiest methods in which an attacker can compromise devices at scale.\u201d The reason is that compromised firmware sitting on the device or system motherboard cannot be detected by security applications running [&hellip;]"}