Thoughts and Ideas to Get You Thinking

2019 Case Study:

Learn how your colleagues leverage our expertise to deploy more secure firmware throughout the telecommunications industry.

Research Report:
Firmware Vulnerabilities

Are these products on your network? Find out which vendor had an intentional backdoor installed.

Supply Chain
Risk Mitigation

IoT devices aren’t built. They’re assembled from components in your supply chain. Are your suppliers sending you bad components? How do you know?

Why Firmware
Vulnerabilities Matter

You will be shocked to learn what we find in firmware. If you’re new to firmware security, or just curious what we find, then start right here.

Firmware Security

Download this stats-packed firmware security infographic if you’re not into the white papers and case studies.

Infographic: Vulnerabilities Explained

A quick, high-level overview of the security issues we routinely find in firmware. A good list of what not to do.