
Sign up to save your podcasts
Or
In this episode of Exploited: The Cyber Truth, RunSafe Security Founder and CEO Joe Saunders joins host Paul Ducklin to uncover one of the most overlooked threats in critical infrastructure: embedded risk.
As industrial systems become more automated and interconnected, embedded devices—once isolated—have become prime targets for attackers. Joe explains why embedded risk differs fundamentally from traditional IT threats, and why legacy systems, unmanaged endpoints, and obscure firmware pose some of the biggest risks to operational technology today.
We explore what makes embedded vulnerabilities so hard to find and fix, how real-time operating systems factor into security decisions, and why patching isn’t always an option in industrial settings. Joe also shares how Secure by Design, SBOMs, and exploit prevention strategies can help CISOs break free from the endless patch cycle and proactively reduce risk.
In this episode:
If you’re responsible for securing factory floors, OT networks, or embedded systems—this is a must-listen conversation.
In this episode of Exploited: The Cyber Truth, RunSafe Security Founder and CEO Joe Saunders joins host Paul Ducklin to uncover one of the most overlooked threats in critical infrastructure: embedded risk.
As industrial systems become more automated and interconnected, embedded devices—once isolated—have become prime targets for attackers. Joe explains why embedded risk differs fundamentally from traditional IT threats, and why legacy systems, unmanaged endpoints, and obscure firmware pose some of the biggest risks to operational technology today.
We explore what makes embedded vulnerabilities so hard to find and fix, how real-time operating systems factor into security decisions, and why patching isn’t always an option in industrial settings. Joe also shares how Secure by Design, SBOMs, and exploit prevention strategies can help CISOs break free from the endless patch cycle and proactively reduce risk.
In this episode:
If you’re responsible for securing factory floors, OT networks, or embedded systems—this is a must-listen conversation.