
Sign up to save your podcasts
Or


Chen Gruber, software developer Embedded Security @CheckPoint about Firmware Security What can hackers learn by extracting data from the file system of the loT Device? Binary scan and static analysis on firmware can give valuable insights into your device and expose the hidden vulnerabilities and weaknesses before hackers find them.
In this session, we demonstrate the firmware scanner service of Check Point and review the results to learn how to make secure devices. The service helps you to keep security hygiene and best practices. Also, to comply with security compliance regulations by providing full SBOM and CVEs.
Technical Level - 300
By Anton Shipulin / Listen Notes4.5
88 ratings
Chen Gruber, software developer Embedded Security @CheckPoint about Firmware Security What can hackers learn by extracting data from the file system of the loT Device? Binary scan and static analysis on firmware can give valuable insights into your device and expose the hidden vulnerabilities and weaknesses before hackers find them.
In this session, we demonstrate the firmware scanner service of Check Point and review the results to learn how to make secure devices. The service helps you to keep security hygiene and best practices. Also, to comply with security compliance regulations by providing full SBOM and CVEs.
Technical Level - 300

78,266 Listeners

2,004 Listeners

370 Listeners

374 Listeners

637 Listeners

1,022 Listeners

31 Listeners

322 Listeners

112,539 Listeners

8,020 Listeners

174 Listeners

314 Listeners

113 Listeners

137 Listeners