Artwork

Content provided by Nachshon Pincu. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nachshon Pincu or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
icon Daily Deals

Part-1: IoT Meetup 05/01/2025 Chen Gruber SW Dev Embedded Security @CheckPoint: Firmware Security

47:48
 
Share
 

Manage episode 462989946 series 3329101
Content provided by Nachshon Pincu. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nachshon Pincu or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Chen Gruber, software developer Embedded Security @CheckPoint about Firmware Security What can hackers learn by extracting data from the file system of the loT Device? Binary scan and static analysis on firmware can give valuable insights into your device and expose the hidden vulnerabilities and weaknesses before hackers find them.

In this session, we demonstrate the firmware scanner service of Check Point and review the results to learn how to make secure devices. The service helps you to keep security hygiene and best practices. Also, to comply with security compliance regulations by providing full SBOM and CVEs.

Technical Level - 300

  continue reading

100 episodes

Artwork
iconShare
 
Manage episode 462989946 series 3329101
Content provided by Nachshon Pincu. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nachshon Pincu or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Chen Gruber, software developer Embedded Security @CheckPoint about Firmware Security What can hackers learn by extracting data from the file system of the loT Device? Binary scan and static analysis on firmware can give valuable insights into your device and expose the hidden vulnerabilities and weaknesses before hackers find them.

In this session, we demonstrate the firmware scanner service of Check Point and review the results to learn how to make secure devices. The service helps you to keep security hygiene and best practices. Also, to comply with security compliance regulations by providing full SBOM and CVEs.

Technical Level - 300

  continue reading

100 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Quick Reference Guide

Listen to this show while you explore
Play