
Sign up to save your podcasts
Or


Send us a text
During a recorded presentation from embedded world 2021, Rich and Brandon are joined by Technology Editor Curt Schwaderer, who doubles as Vice President of Engineering at intelligence and security provider Yaana Technologies. The three discuss how the tech industry in particular and connected organizations in general have transitioned from protecting devices from attacks to accepting they will be hacked and mitigating losses to modern threat intelligence and modeling strategies. They then look at this evolution through the lens of employees, who are handling and working with sensitive information and IP, working from home.
DON'T FORGET TO REGISTER FOR A FREE EMBEDDED WORLD-IN-A-BOX! LESS THAN 100 REMAIN! GET YOURS TODAY: https://www.embeddedcomputing.com/pages/ew-in-a-box-reg
Later, Vincent Scott, Founder of Defense Cybersecurity Group, Chief Security Officer at STI-TEC, and former Navy cryptologist joins the Insiders to review the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) and what it will mean for companies delivering technology to the U.S. Armed Forces. In Scott's view, the CMMC presents obstacles – such as an assumption of on-premise infrastructure – that may make companies just starting out reconsider serving those markets and subsequently impact the nation's cyber readiness.
Finally, Brandon fills in for Perry in this week's Tech Market Madness. A recent report from Dragos indicates that threats to industrial control systems tripled in 2020, while 90 percent of organizations don't have visibility into what's taking place beyond the IT/OT network boundary. Brandon investigates just what could be going on back there as he reviews how another industrial cybersecurity firm, Claroty, uncovered vulnerabilities in WIBU Systems' CodeMeter licensing software deployed on ICSs worldwide. Sharon Brizinov, a Claroty researcher, demonstrates just how easy it could have been to compromise systems running the software, both locally and remotely.
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...
Listen on: Apple Podcasts Spotify
For more information, visit embeddedcomputing.com
By Embedded Computing Design4.2
1111 ratings
Send us a text
During a recorded presentation from embedded world 2021, Rich and Brandon are joined by Technology Editor Curt Schwaderer, who doubles as Vice President of Engineering at intelligence and security provider Yaana Technologies. The three discuss how the tech industry in particular and connected organizations in general have transitioned from protecting devices from attacks to accepting they will be hacked and mitigating losses to modern threat intelligence and modeling strategies. They then look at this evolution through the lens of employees, who are handling and working with sensitive information and IP, working from home.
DON'T FORGET TO REGISTER FOR A FREE EMBEDDED WORLD-IN-A-BOX! LESS THAN 100 REMAIN! GET YOURS TODAY: https://www.embeddedcomputing.com/pages/ew-in-a-box-reg
Later, Vincent Scott, Founder of Defense Cybersecurity Group, Chief Security Officer at STI-TEC, and former Navy cryptologist joins the Insiders to review the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) and what it will mean for companies delivering technology to the U.S. Armed Forces. In Scott's view, the CMMC presents obstacles – such as an assumption of on-premise infrastructure – that may make companies just starting out reconsider serving those markets and subsequently impact the nation's cyber readiness.
Finally, Brandon fills in for Perry in this week's Tech Market Madness. A recent report from Dragos indicates that threats to industrial control systems tripled in 2020, while 90 percent of organizations don't have visibility into what's taking place beyond the IT/OT network boundary. Brandon investigates just what could be going on back there as he reviews how another industrial cybersecurity firm, Claroty, uncovered vulnerabilities in WIBU Systems' CodeMeter licensing software deployed on ICSs worldwide. Sharon Brizinov, a Claroty researcher, demonstrates just how easy it could have been to compromise systems running the software, both locally and remotely.
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...
Listen on: Apple Podcasts Spotify
For more information, visit embeddedcomputing.com

32,006 Listeners

271 Listeners

383 Listeners

289 Listeners

1,646 Listeners

626 Listeners

585 Listeners

231 Listeners

190 Listeners

214 Listeners

289 Listeners

64 Listeners

348 Listeners

10,785 Listeners

64 Listeners