Embedded cover image

414: Puff, the Magically Secure Dragon

Embedded

00:00

How to Write a Security Talk at the Hardware Io a Conference?

Co, have you written your talk yet? Tell me i know how this goes. I definitely have the slides going, and i'm beginning to practise to make sure i have everything. How a malicious actor could use this to do bad things is probably the most interesting questions. Do you, what do you have for that? A, that's actually how a maliciousActor could use thisto do bad things,. Is there anything else we should be aware of in terms of security issues or potential problems with our software? We would like to hear from anyone who has any information on these matters. Please send us an email at jennifer.smith@cnn.com.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app