
Sign up to save your podcasts
Or


In this episode of Below the Surface, the hosts discuss critical cybersecurity topics including vulnerabilities in Netgear and Gigabyte devices, the importance of asset inventory, and the implications of Row Hammer attacks on memory integrity. They emphasize the need for organizations to implement compensating controls and monitor for potential threats, especially in the context of supply chain security and IoT devices.
Chapters
00:00 Introduction to Cybersecurity Challenges
02:20 Exploring Netgear's Role in Enterprise Security
09:08 The Impact of Shadow IT on Network Security
15:04 Firmware Integrity and Security Measures
18:05 Gigabyte's UEFI Vulnerabilities and Industry Implications
22:25 Understanding UEFI Vulnerabilities
28:46 Consumer vs. Enterprise Hardware Security
35:06 Monitoring and Mitigating Firmware Risks
41:11 The Impact of ECC on AI Performance
By Eclypsium5
22 ratings
In this episode of Below the Surface, the hosts discuss critical cybersecurity topics including vulnerabilities in Netgear and Gigabyte devices, the importance of asset inventory, and the implications of Row Hammer attacks on memory integrity. They emphasize the need for organizations to implement compensating controls and monitor for potential threats, especially in the context of supply chain security and IoT devices.
Chapters
00:00 Introduction to Cybersecurity Challenges
02:20 Exploring Netgear's Role in Enterprise Security
09:08 The Impact of Shadow IT on Network Security
15:04 Firmware Integrity and Security Measures
18:05 Gigabyte's UEFI Vulnerabilities and Industry Implications
22:25 Understanding UEFI Vulnerabilities
28:46 Consumer vs. Enterprise Hardware Security
35:06 Monitoring and Mitigating Firmware Risks
41:11 The Impact of ECC on AI Performance

228,524 Listeners

2,004 Listeners

209 Listeners

265 Listeners

374 Listeners

637 Listeners

89 Listeners

322 Listeners

8,020 Listeners

61 Listeners

586 Listeners

1 Listeners