
Sign up to save your podcasts
Or


IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given modern appsec practices, and what the opportunities are to make these devices more secure for everyone.
Segment resources:
Show Notes: https://securityweekly.com/asw-297
By Security Weekly Productions4.8
44 ratings
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given modern appsec practices, and what the opportunities are to make these devices more secure for everyone.
Segment resources:
Show Notes: https://securityweekly.com/asw-297

7,608 Listeners

372 Listeners

270 Listeners

372 Listeners

651 Listeners

1,019 Listeners

8,057 Listeners

179 Listeners

180 Listeners

315 Listeners

73 Listeners

57 Listeners

139 Listeners

40 Listeners

44 Listeners