Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...
All content for The Embedded Frontier is the property of Jacob Beningo and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...
#014 - Modernizing Embedded Systems: A 7-Step Framework
The Embedded Frontier
38 minutes
8 months ago
#014 - Modernizing Embedded Systems: A 7-Step Framework
Summary In this episode of the Embedded Frontier Podcast, Jacob Beningo introduces a comprehensive framework for modernizing embedded systems development. He discusses the importance of adapting to modern techniques in firmware development, emphasizing the need for a shift in workflows, architectures, and tools. The episode outlines a seven-step process that includes modernizing build systems, improving software architecture, implementing DevOps practices, embracing test-driven development, ...
The Embedded Frontier
Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire developme...