Thoughts and Ideas to Get You Thinking
2019 Case Study:
Learn how your colleagues leverage our expertise to deploy more secure firmware throughout the telecommunications industry.
Are these products on your network? Find out which vendor had an intentional backdoor installed.
IoT devices aren’t built. They’re assembled from components in your supply chain. Are your suppliers sending you bad components? How do you know?
You will be shocked to learn what we find in firmware. If you’re new to firmware security, or just curious what we find, then start right here.
Download this stats-packed firmware security infographic if you’re not into the white papers and case studies.
Infographic: Vulnerabilities Explained
A quick, high-level overview of the security issues we routinely find in firmware. A good list of what not to do.