Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Jacob Beningo. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Beningo or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#021 - From Pray and Patch to Proactive: Modernizing Embedded Security

37:47
 
Share
 

Manage episode 523760209 series 3546005
Content provided by Jacob Beningo. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Beningo or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob

This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire development lifecycle.
Key Takeaways:
• Memory exploits (buffer overflows, out-of-bounds reads/writes, use-after-free) are the most common embedded system vulnerabilities
• Nation-state actors like Voltaifun are actively targeting critical infrastructure through embedded devices
• Even simple connected devices like $20 coffee makers pose significant security risks through botnets and grid manipulation
• Supply chain attacks have risen 700% in recent years, requiring secure programming and signed keys throughout manufacturing
• Threat Model Security Analysis (TMSA) should be performed upfront to identify critical data and potential attack vectors
• Hardware isolation using ARM TrustZone, multi-core processors, or memory protection units provides essential security layers
• Software Bill of Materials (SBOM) helps track open source components and monitor for newly discovered vulnerabilities
• Static and dynamic analysis tools should be integrated into CI/CD pipelines for continuous security monitoring
• Security must be considered throughout the entire device lifecycle, from design to end-of-life decommissioning
• Proactive security approaches using runtime protection tools are more effective than reactive patching strategies

  continue reading

22 episodes

Artwork
iconShare
 
Manage episode 523760209 series 3546005
Content provided by Jacob Beningo. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Beningo or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob

This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire development lifecycle.
Key Takeaways:
• Memory exploits (buffer overflows, out-of-bounds reads/writes, use-after-free) are the most common embedded system vulnerabilities
• Nation-state actors like Voltaifun are actively targeting critical infrastructure through embedded devices
• Even simple connected devices like $20 coffee makers pose significant security risks through botnets and grid manipulation
• Supply chain attacks have risen 700% in recent years, requiring secure programming and signed keys throughout manufacturing
• Threat Model Security Analysis (TMSA) should be performed upfront to identify critical data and potential attack vectors
• Hardware isolation using ARM TrustZone, multi-core processors, or memory protection units provides essential security layers
• Software Bill of Materials (SBOM) helps track open source components and monitor for newly discovered vulnerabilities
• Static and dynamic analysis tools should be integrated into CI/CD pipelines for continuous security monitoring
• Security must be considered throughout the entire device lifecycle, from design to end-of-life decommissioning
• Proactive security approaches using runtime protection tools are more effective than reactive patching strategies

  continue reading

22 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play