Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...
All content for The Embedded Frontier is the property of Jacob Beningo and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...
#005 - The Risks of Zero-Day Attacks in Open Source Software with Frank Huerta
The Embedded Frontier
53 minutes
1 year ago
#005 - The Risks of Zero-Day Attacks in Open Source Software with Frank Huerta
SummaryIn this episode, Jacob Beningo interviews Frank Herta, the CEO of Curtail Incorporated, about the risks of zero-day attacks in open source software. They discuss the importance of DevSecOps and the need for comprehensive security measures. Frank shares his background in security and how his company is working on detecting zero-day bugs. They also explore the vulnerabilities of open source software and the potential for third-party supply chain attacks. Open source software testing...
The Embedded Frontier
Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...