all InfoSec news
Vulnerabilities in Old Third-Party Software Components- Importance of Having SBoM for IoT/OT Devices
March 26, 2024, 5:05 p.m. | Black Hat
Black Hat www.youtube.com
Device manufacturers often rely on "security by obscurity" for their own code - e.g., by encrypting firmware files - and on the "principle of many eyes" when choosing to integrate open source components - i.e., if there are no public CVEs, a component is considered safe.
This talk shows that these principles can fail the manufacturers, but …
code components device devices files firmware hard iot manufacturers old ot devices own party sbom security software software components third third-party vulnerabilities
More from www.youtube.com / Black Hat
Locknote: Conclusions and Key Takeaways from Day 2
2 weeks, 2 days ago |
www.youtube.com
Locknote: Conclusions and Key Takeaways from Day 1
2 weeks, 2 days ago |
www.youtube.com
Keynote: My Lessons from the Uber Case
2 weeks, 2 days ago |
www.youtube.com
The Black Hat Europe Network Operations Center (NOC) Report
2 weeks, 3 days ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Data & Security Engineer Lead
@ LiquidX | Singapore, Central Singapore, Singapore
IT and Cyber Risk Control Lead
@ GXS Bank | Singapore - OneNorth
Consultant Senior en Gestion de Crise Cyber et Continuité d’Activité H/F
@ Hifield | Sèvres, France
Cyber Security Analyst (Weekend 1st Shift)
@ Fortress Security Risk Management | Cleveland, OH, United States
Senior Manager, Cybersecurity
@ BlueTriton Brands | Stamford, CT, US