24 min

What Are the Table Stakes for IoT Security‪?‬ Embedded Insiders

    • Technology

In this edition of the Embedded Insiders, Brandon and Rich ponder when “enough is enough” in terms of IoT device security. Because implementing robust security is so time consuming and expensive, why haven’t we just created development workflows that make it more costly to NOT use security? 
Later, the Insiders are joined by Jeremy Boone, Technical Director of The NCC Group, security analysis firm. Together, the trio consider how flaws at all levels of the IoT solution stack can be exploited, as well as engineering best practices that can minimize these vulnerabilities. This boils down to CYA with CIA.
Finally, Jean Labrosse is back with more “Things That Annoy a Veteran Software Engineer” where he explains why it drives him nuts when a programmer over-uses asserts.

For more information, visit embeddedcomputing.com

In this edition of the Embedded Insiders, Brandon and Rich ponder when “enough is enough” in terms of IoT device security. Because implementing robust security is so time consuming and expensive, why haven’t we just created development workflows that make it more costly to NOT use security? 
Later, the Insiders are joined by Jeremy Boone, Technical Director of The NCC Group, security analysis firm. Together, the trio consider how flaws at all levels of the IoT solution stack can be exploited, as well as engineering best practices that can minimize these vulnerabilities. This boils down to CYA with CIA.
Finally, Jean Labrosse is back with more “Things That Annoy a Veteran Software Engineer” where he explains why it drives him nuts when a programmer over-uses asserts.

For more information, visit embeddedcomputing.com

24 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
The Neuron: AI Explained
The Neuron
TED Radio Hour
NPR
Dwarkesh Podcast
Dwarkesh Patel