What is a Root of Trust (RoT)?Hardware Security Modules (HSMs) and RoTSecuring Digital Identities with RoTThe Threat Landscape and the Need for Strong RoTHow Didit HelpsReady to Get Started?