Embedded Insiders

Threat Modeling and Intelligence While Working from Home


Listen Later

Send us a text

During a recorded presentation from  embedded world 2021, Rich and Brandon are joined by Technology Editor Curt Schwaderer, who doubles as Vice President of Engineering at intelligence and security provider Yaana Technologies. The three discuss how the tech industry in particular and connected organizations in general have transitioned from protecting devices from attacks to accepting they will be hacked and mitigating losses to modern threat intelligence and modeling strategies. They then look at this evolution through the lens of employees, who are handling and working with sensitive information and IP, working from home.

DON'T  FORGET  TO REGISTER  FOR A FREE EMBEDDED WORLD-IN-A-BOX! LESS THAN 100 REMAIN! GET YOURS TODAY: https://www.embeddedcomputing.com/pages/ew-in-a-box-reg

Later, Vincent Scott, Founder of Defense Cybersecurity Group, Chief Security Officer at STI-TEC, and former Navy cryptologist joins the Insiders to review the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) and what it will mean for companies delivering technology to the U.S. Armed Forces. In Scott's view, the CMMC presents obstacles – such as an assumption of on-premise infrastructure – that may make companies just starting out reconsider serving those markets and subsequently impact the nation's cyber readiness.

Finally, Brandon fills in for Perry in this week's Tech Market Madness. A recent report from Dragos indicates that threats to industrial control systems tripled in 2020,  while 90 percent of organizations  don't  have visibility into what's taking place beyond the IT/OT network boundary. Brandon investigates just what could be going on back there as he reviews how another industrial cybersecurity firm,  Claroty, uncovered vulnerabilities in  WIBU Systems' CodeMeter licensing software deployed on ICSs worldwide. Sharon Brizinov, a Claroty researcher, demonstrates just how easy it could have been to compromise systems running the software, both locally and remotely.

How Hacks Happen

Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...

Listen on: Apple Podcasts   Spotify


For more information, visit embeddedcomputing.com

...more
View all episodesView all episodes
Download on the App Store

Embedded InsidersBy Embedded Computing Design

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

11 ratings


More shows like Embedded Insiders

View all
Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

32,006 Listeners

Software Engineering Radio by se-radio@computer.org

Software Engineering Radio

271 Listeners

Hanselminutes with Scott Hanselman by Scott Hanselman

Hanselminutes with Scott Hanselman

383 Listeners

The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

289 Listeners

WSJ Tech News Briefing by The Wall Street Journal

WSJ Tech News Briefing

1,646 Listeners

Software Engineering Daily by Software Engineering Daily

Software Engineering Daily

626 Listeners

Talk Python To Me by Michael Kennedy

Talk Python To Me

585 Listeners

The Amp Hour Electronics Podcast by The Amp Hour (Chris Gammell and David L Jones)

The Amp Hour Electronics Podcast

231 Listeners

Embedded by Logical Elegance

Embedded

190 Listeners

Python Bytes by Michael Kennedy and Brian Okken

Python Bytes

214 Listeners

ChinaTalk by Jordan Schneider

ChinaTalk

289 Listeners

The Stack Overflow Podcast by The Stack Overflow Podcast

The Stack Overflow Podcast

64 Listeners

Business Breakdowns by Colossus | Investing & Business Podcasts

Business Breakdowns

348 Listeners

The Weekly Show with Jon Stewart by Comedy Central

The Weekly Show with Jon Stewart

10,785 Listeners

The Pragmatic Engineer by Gergely Orosz

The Pragmatic Engineer

64 Listeners