
Sign up to save your podcasts
Or


The software supply chain often gets all the attention, but what about its foundation? In this episode of Exploited: The Cyber Truth, RunSafe Security Founder and CEO Joseph M. Saunders explores why securing the firmware supply chain is critical as attackers look to target the lowest layers of devices.
Joe explains how firmware vulnerabilities in embedded and connected devices—across healthcare, automotive, energy, and defense—can be exploited at scale, and why legacy assumptions about firmware trust are no longer enough. Listeners will learn:
This episode uncovers an often-overlooked attack surface, showing why securing firmware is a strategic priority for reducing risk at scale.
By RunSafe SecurityThe software supply chain often gets all the attention, but what about its foundation? In this episode of Exploited: The Cyber Truth, RunSafe Security Founder and CEO Joseph M. Saunders explores why securing the firmware supply chain is critical as attackers look to target the lowest layers of devices.
Joe explains how firmware vulnerabilities in embedded and connected devices—across healthcare, automotive, energy, and defense—can be exploited at scale, and why legacy assumptions about firmware trust are no longer enough. Listeners will learn:
This episode uncovers an often-overlooked attack surface, showing why securing firmware is a strategic priority for reducing risk at scale.