addressing the problem of malware, exploits, zero-day attacks, worms, viruses, side-channel attacks, brute force attacks, rootkits, privilege escalation, lack of isolation using approaches such as virtualization, randomization, moving target defenses, ASLR, obfuscation, sandboxes, containers, roots or trust, TPMs, hardware security elements, authentication
The Conundrum of Cyber-Security
So why does the problem of cyber-security just keep [...]