
Sign up to save your podcasts
Or


Military-grade xIoT hacking tools are in use, cybercrime for hire that's predicated on compromised xIoT devices has been monetized, and organizations worldwide are already "pwned" without even knowing it. Bad actors are counting on you being passive when it comes to xIoT security. Disappoint them!
Segment Resources:
xIoT Threat & Trend Report https://phosphorus.io/xiot-threat-and-trend-report-2022/
xIoT Security Podcast https://phosphorus.io/podcast/
Phosphorus Labs https://phosphorus.io/labs/
Visit https://www.securityweekly.com/esw for all the latest episodes!
Show Notes: https://securityweekly.com/esw302
By Security Weekly Productions4.7
33 ratings
Military-grade xIoT hacking tools are in use, cybercrime for hire that's predicated on compromised xIoT devices has been monetized, and organizations worldwide are already "pwned" without even knowing it. Bad actors are counting on you being passive when it comes to xIoT security. Disappoint them!
Segment Resources:
xIoT Threat & Trend Report https://phosphorus.io/xiot-threat-and-trend-report-2022/
xIoT Security Podcast https://phosphorus.io/podcast/
Phosphorus Labs https://phosphorus.io/labs/
Visit https://www.securityweekly.com/esw for all the latest episodes!
Show Notes: https://securityweekly.com/esw302

181 Listeners

189 Listeners