
Sign up to save your podcasts
Or


Hackers are using firmware implants and backdoors to compromise enterprise security with attacks that are stealthy and persistent. It's time for information security specialists to learn how to attack and defend enterprise infrastructure. John will provide a preview of his upcoming presentation at InfoSec World where he will demonstrate attacks on firmware that are invisible to traditional security platforms, and show how to detect and defend against them.
Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode638
By Security Weekly Productions5
22 ratings
Hackers are using firmware implants and backdoors to compromise enterprise security with attacks that are stealthy and persistent. It's time for information security specialists to learn how to attack and defend enterprise infrastructure. John will provide a preview of his upcoming presentation at InfoSec World where he will demonstrate attacks on firmware that are invisible to traditional security platforms, and show how to detect and defend against them.
Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode638

2,009 Listeners

364 Listeners

148 Listeners

83 Listeners

80 Listeners

651 Listeners

5 Listeners

8,070 Listeners

51 Listeners

316 Listeners
![Talkin' Bout [Infosec] News by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
95 Listeners

140 Listeners

167 Listeners