Exploited: The Cyber Truth

Risk Reduction at the Core: Securing the Firmware Supply Chain


Listen Later

The software supply chain often gets all the attention, but what about its foundation? In this episode of Exploited: The Cyber Truth, RunSafe Security Founder and CEO Joseph M. Saunders explores why securing the firmware supply chain is critical as attackers look to target the lowest layers of devices.

Joe explains how firmware vulnerabilities in embedded and connected devices—across healthcare, automotive, energy, and defense—can be exploited at scale, and why legacy assumptions about firmware trust are no longer enough. Listeners will learn:

  • Tactics adversaries use to exploit firmware vulnerabilities
  • Risks inherited from third-party firmware and complex supply chains
  • How “shifting security down the stack” enhances trust for all systems above it
  • Practical steps CISOs, security leaders, and device manufacturers can take to harden firmware

This episode uncovers an often-overlooked attack surface, showing why securing firmware is a strategic priority for reducing risk at scale.

...more
View all episodesView all episodes
Download on the App Store

Exploited: The Cyber TruthBy RunSafe Security