We are at the brink of the Fourth Industrial Revolution, where OT and IT converges due to the influx of IoT. As a result, perimeter security can no longer be effective to protect your assets against malicious attackers; embedded system security has become more important than ever because IoT devices are going to be more physically accessible by the attackers. Hence, we have dedicated people and resources to research on hardware and firmware-level attacks.
This area focuses on establishing ubiquitous trust across the targeted infrastructure or ecosystem. It is sometimes take, together with the hardware assurance team , to help establish the robustness via its full end-to-end security.