How do you protect critical infrastructure—the systems that keep the lights on, water flowing, and communities functioning—from threats that span cyberspace, geopolitics, and emerging technology? That’s the question host Paul Ducklin explored with Joseph M. Saunders,...
AI is now woven into the everyday workflows of embedded engineers. It writes code, generates tests, reviews logs, and scans for vulnerabilities. But the same tools that speed up development are introducing new risks—many of which can compromise the stability of...
Key Takeaways The 2025 SBOM minimum elements represent significant progress since the 2021 baseline. New fields, such as license, hashes, and generation context, push SBOMs beyond check-the-box compliance. Licensing data closes a critical blind spot in software supply...
Ask any product manager about their biggest budget headaches, and security will likely make the top three. It’s easy to see why. Security investments feel like insurance premiums, necessary but painful expenses that drain resources from feature development and...
Get the key takeaways—listen to the audio overview. From medical devices and aerospace systems to industrial controls and automotive ECUs, embedded systems are the unsung heroes of modern technology. But with that ubiquity comes risk. Threat actors increasingly...
Listen to the Audio Overview Critical infrastructure and the embedded systems that underlie it are under attack. State-sponsored threat groups, like MISSION2025 and Volt Typhoon, are specifically targeting key sectors integral to national and economic security,...