
Sign up to save your podcasts
Or


Mobile and embedded devices require a tailored approach to security, and this episode explains how to apply protections without compromising usability. We begin with passcodes, biometrics, and auto-lock timers as primary defenses. Next, we explore mobile device management (MDM), including how organizations use it to enforce encryption, remotely wipe lost devices, and manage application permissions.
We also touch on embedded systems—devices like smart thermostats, printers, and routers—and the unique security challenges they pose, such as hard-coded credentials and limited firmware update support. These topics often appear in exam questions that ask you to choose appropriate security measures based on device type. Brought to you by BareMetalCyber.com.
By Dr. Jason Edwards5
22 ratings
Mobile and embedded devices require a tailored approach to security, and this episode explains how to apply protections without compromising usability. We begin with passcodes, biometrics, and auto-lock timers as primary defenses. Next, we explore mobile device management (MDM), including how organizations use it to enforce encryption, remotely wipe lost devices, and manage application permissions.
We also touch on embedded systems—devices like smart thermostats, printers, and routers—and the unique security challenges they pose, such as hard-coded credentials and limited firmware update support. These topics often appear in exam questions that ask you to choose appropriate security measures based on device type. Brought to you by BareMetalCyber.com.

228,897 Listeners

27,895 Listeners

231 Listeners

6,417 Listeners

8,061 Listeners

368,917 Listeners

45,409 Listeners

1,411 Listeners

20 Listeners

8,023 Listeners

19 Listeners

3 Listeners

5 Listeners

0 Listeners

3 Listeners