Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...
All content for The Embedded Frontier is the property of Jacob Beningo and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...
Summary In this episode of the Embedded Frontier, Jacob Beningo discusses the key trends observed at Embedded World 2025, focusing on the integration of commercial tools with modern workflows, the rise of Zephyr as a dominant RTOS, the pervasive influence of AI in embedded systems, the necessity of multi-core processors, and the mainstream adoption of DevOps practices. Beningo emphasizes the importance of adapting to these trends to enhance development efficiency and product reliability. Take...
The Embedded Frontier
Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...