all InfoSec news
Vulnerabilities in Old Third-Party Software Components- Importance of Having SBoM for IoT/OT Devices
March 26, 2024, 5:05 p.m. | Black Hat
Black Hat www.youtube.com
Device manufacturers often rely on "security by obscurity" for their own code - e.g., by encrypting firmware files - and on the "principle of many eyes" when choosing to integrate open source components - i.e., if there are no public CVEs, a component is considered safe.
This talk shows that these principles can fail the manufacturers, but …
code components device devices files firmware hard iot manufacturers old ot devices own party sbom security software software components third third-party vulnerabilities
More from www.youtube.com / Black Hat
Black Hat Asia 2024 Highlights
2 weeks, 3 days ago |
www.youtube.com
Locknote: Conclusions and Key Takeaways from Day 2
1 month, 3 weeks ago |
www.youtube.com
Locknote: Conclusions and Key Takeaways from Day 1
1 month, 3 weeks ago |
www.youtube.com
Keynote: My Lessons from the Uber Case
1 month, 3 weeks ago |
www.youtube.com
The Black Hat Europe Network Operations Center (NOC) Report
1 month, 3 weeks ago |
www.youtube.com
My Invisible Adversary: Burnout
1 month, 3 weeks ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC