1.800.677.7305

Campbell, CA  |

Blog

red firmware

Phoenix Technologies Supports the UEFI Test Work Group (UTWG)

Phoenix Technologies strengthens its collaboration with the UEFI Test Work Group to enhance firmware testing, validation, and compliance across diverse platforms.
Read More →
abstract computer power button on tech background

Secure Boot: A Critical Component of the System Boot Process 

Secure Boot ensures only trusted software runs during startup, protecting systems from firmware-level attacks and rootkits, but requires proper setup.
Read More →
Finger pointing at lock on screen

How UEFI Security Vulnerabilities Are Fixed – Phoenix Technologies’ Perspective

LogoFAIL, a critical UEFI vulnerability, was identified by Binarly in 2023. Phoenix Technologies swiftly resolved it, ensuring secure global firmware updates.
Read More →
Abstract number chart background

CVSS 4.0 is Here!

CVSS is an open standard that is used by security professionals everywhere. In fact, Phoenix uses it each time we issue a final pen testing ...
Read More →
green circuit board

Decoding UEFI Firmware: Unraveling the Intricacies of System Firmware, its Ecosystem and Supply Chain Part 2 of 3

In part 2 of this 3 part series, we explore In the realm of UEFI-based firmware how diverse components, from chip vendor code to specialized ...
Read More →
Abstract laptop with circuit board on screen

Decoding UEFI Firmware: Unraveling the Intricacies of System Firmware, its Ecosystem and Supply Chain Part 1 of 3

In part 1 of this 3 part series, we explore the complexities of system firmware and its connection to the UEFI standard. Understand the evolution ...
Read More →

Autonomous Vehicle Cybersecurity: How to Secure Autonomous Vehicles

Over the last century, vehicles have become increasingly connected and computerized, with the future promising complete L4/L5 autonomy. The complex ...
Read More →

Cybersecurity in Autonomous Vehicles: From Development to Ongoing Mitigation

This is part 4 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, ...
Read More →
Interior of autonomous car. Car digitalization concept.

The Top 5 Autonomous Vehicle Security Gaps

This is part 3 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, ...
Read More →