Artwork

المحتوى المقدم من Jacob Beningo. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Jacob Beningo أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

#021 - From Pray and Patch to Proactive: Modernizing Embedded Security

37:47
 
مشاركة
 

Manage episode 523760209 series 3546005
المحتوى المقدم من Jacob Beningo. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Jacob Beningo أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob

This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire development lifecycle.
Key Takeaways:
• Memory exploits (buffer overflows, out-of-bounds reads/writes, use-after-free) are the most common embedded system vulnerabilities
• Nation-state actors like Voltaifun are actively targeting critical infrastructure through embedded devices
• Even simple connected devices like $20 coffee makers pose significant security risks through botnets and grid manipulation
• Supply chain attacks have risen 700% in recent years, requiring secure programming and signed keys throughout manufacturing
• Threat Model Security Analysis (TMSA) should be performed upfront to identify critical data and potential attack vectors
• Hardware isolation using ARM TrustZone, multi-core processors, or memory protection units provides essential security layers
• Software Bill of Materials (SBOM) helps track open source components and monitor for newly discovered vulnerabilities
• Static and dynamic analysis tools should be integrated into CI/CD pipelines for continuous security monitoring
• Security must be considered throughout the entire device lifecycle, from design to end-of-life decommissioning
• Proactive security approaches using runtime protection tools are more effective than reactive patching strategies

  continue reading

22 حلقات

Artwork
iconمشاركة
 
Manage episode 523760209 series 3546005
المحتوى المقدم من Jacob Beningo. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Jacob Beningo أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob

This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire development lifecycle.
Key Takeaways:
• Memory exploits (buffer overflows, out-of-bounds reads/writes, use-after-free) are the most common embedded system vulnerabilities
• Nation-state actors like Voltaifun are actively targeting critical infrastructure through embedded devices
• Even simple connected devices like $20 coffee makers pose significant security risks through botnets and grid manipulation
• Supply chain attacks have risen 700% in recent years, requiring secure programming and signed keys throughout manufacturing
• Threat Model Security Analysis (TMSA) should be performed upfront to identify critical data and potential attack vectors
• Hardware isolation using ARM TrustZone, multi-core processors, or memory protection units provides essential security layers
• Software Bill of Materials (SBOM) helps track open source components and monitor for newly discovered vulnerabilities
• Static and dynamic analysis tools should be integrated into CI/CD pipelines for continuous security monitoring
• Security must be considered throughout the entire device lifecycle, from design to end-of-life decommissioning
• Proactive security approaches using runtime protection tools are more effective than reactive patching strategies

  continue reading

22 حلقات

Semua episod

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

حقوق الطبع والنشر 2025 | سياسة الخصوصية | شروط الخدمة | | حقوق النشر
استمع إلى هذا العرض أثناء الاستكشاف
تشغيل