Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Coredump Sessions - #008: Navigating the Changing IoT Security Landscape: A Survival Guide for Product Leaders

#008: Navigating the Changing IoT Security Landscape: A Survival Guide for Product Leaders

05/13/25 • 58 min

Coredump Sessions

In today's Coredump Session, we dive into the evolving landscape of IoT security regulations with Giovanni Alberto Falcione, CTO at Exine. From the impact of the EU's CRA to the complexities of OTA updates, Giovanni, François, and Thomas unpack what these new requirements mean for product engineers and how to navigate the increasingly stringent security landscape.

Speakers:

  • François Baldassari: CEO & Founder, Memfault
  • Thomas Sarlandie: Field CTO, Memfault
  • Giovanni Alberto Falcione: CTO, Exein

Key Takeaways:

  • The EU's Cyber Resilience Act (CRA) mandates stringent security measures for all connected devices marketed after December 2027, with a particular focus on runtime security monitoring.
  • OTA updates are essential for mitigating vulnerabilities in the field but can also introduce challenges in regulatory compliance.
  • Giovanni highlights that less than 1% of IoT device manufacturers actively monitor cybersecurity state awareness, a critical area of compliance under CRA.
  • Implementing a Software Bill of Materials (SBOM) and tracking Common Vulnerabilities and Exposures (CVEs) are low-hanging fruit for product teams to start bolstering security.
  • eBPF technology offers powerful, low-impact monitoring capabilities that can detect unauthorized activities at the syscall level without kernel-level intervention.
  • Companies need to plan for at least five years of security updates under CRA, with potential for longer support based on device lifecycles.
  • Even seemingly innocuous devices, like coffee makers, can pose significant cybersecurity risks as entry points for broader attacks.
  • Giovanni emphasizes that while regulation can stifle innovation, it also raises the bar for security practices across the board.

Chapters:

00:00 Introduction and Guest Introduction02:30 The Unseen Costs of Cybersecurity Regulation04:40 OTA Updates: Security Savior or Hidden Risk07:21 CRA vs. Other Regulations: What Matters Most10:30 The Rise of Runtime Security Monitoring12:23 Why Manufacturers Are Freaking Out About CRA15:09 The Hidden Cost of Legacy Firmware17:30 Inside the Automotive Cybersecurity Playbook21:22 eBPF: The Next Frontier in IoT Security55:38 Coffee Machines, Coffee Attacks, and Unexpected Entry Points

⁠⁠Join the Interrupt Slack

Watch this episode on YouTube

⁠Suggest a Guest⁠

⁠⁠

Follow Memfault

Other ways to listen:

⁠⁠Apple Podcasts

iHeartRadio⁠⁠

⁠⁠Amazon Music

GoodPods

Castbox

⁠⁠

plus icon
bookmark

In today's Coredump Session, we dive into the evolving landscape of IoT security regulations with Giovanni Alberto Falcione, CTO at Exine. From the impact of the EU's CRA to the complexities of OTA updates, Giovanni, François, and Thomas unpack what these new requirements mean for product engineers and how to navigate the increasingly stringent security landscape.

Speakers:

  • François Baldassari: CEO & Founder, Memfault
  • Thomas Sarlandie: Field CTO, Memfault
  • Giovanni Alberto Falcione: CTO, Exein

Key Takeaways:

  • The EU's Cyber Resilience Act (CRA) mandates stringent security measures for all connected devices marketed after December 2027, with a particular focus on runtime security monitoring.
  • OTA updates are essential for mitigating vulnerabilities in the field but can also introduce challenges in regulatory compliance.
  • Giovanni highlights that less than 1% of IoT device manufacturers actively monitor cybersecurity state awareness, a critical area of compliance under CRA.
  • Implementing a Software Bill of Materials (SBOM) and tracking Common Vulnerabilities and Exposures (CVEs) are low-hanging fruit for product teams to start bolstering security.
  • eBPF technology offers powerful, low-impact monitoring capabilities that can detect unauthorized activities at the syscall level without kernel-level intervention.
  • Companies need to plan for at least five years of security updates under CRA, with potential for longer support based on device lifecycles.
  • Even seemingly innocuous devices, like coffee makers, can pose significant cybersecurity risks as entry points for broader attacks.
  • Giovanni emphasizes that while regulation can stifle innovation, it also raises the bar for security practices across the board.

Chapters:

00:00 Introduction and Guest Introduction02:30 The Unseen Costs of Cybersecurity Regulation04:40 OTA Updates: Security Savior or Hidden Risk07:21 CRA vs. Other Regulations: What Matters Most10:30 The Rise of Runtime Security Monitoring12:23 Why Manufacturers Are Freaking Out About CRA15:09 The Hidden Cost of Legacy Firmware17:30 Inside the Automotive Cybersecurity Playbook21:22 eBPF: The Next Frontier in IoT Security55:38 Coffee Machines, Coffee Attacks, and Unexpected Entry Points

⁠⁠Join the Interrupt Slack

Watch this episode on YouTube

⁠Suggest a Guest⁠

⁠⁠

Follow Memfault

Other ways to listen:

⁠⁠Apple Podcasts

iHeartRadio⁠⁠

⁠⁠Amazon Music

GoodPods

Castbox

⁠⁠

Previous Episode

undefined - #007: AI, Open Source, and the Future of Embedded Development: How Much Code Will We Actually Write?

#007: AI, Open Source, and the Future of Embedded Development: How Much Code Will We Actually Write?

In today's Coredump Session, we dive into a wide-ranging conversation about the intersection of AI, open source, and embedded systems with the teams from Memfault and Goliath. From the evolution of AI at the edge to the emerging role of large language models (LLMs) in firmware development, the panel explores where innovation is happening today — and where expectations still outpace reality. Listen in as they untangle the practical, the possible, and the hype shaping the future of IoT devices.

Speakers:

  • François Baldassari: CEO & Founder, Memfault
  • Thomas Sarlandie: Field CTO, Memfault
  • Jonathan Beri: CEO & Founder, Golioth
  • Dan Mangum: CTO, Golioth

Key Takeaways:

  • AI has been quietly powering embedded devices for years, especially in edge applications like voice recognition and computer vision.
  • The biggest gains in IoT today often come from cloud-based AI analytics, not necessarily from AI models running directly on devices.
  • LLMs are reshaping firmware development workflows but are not yet widely adopted for production-grade embedded codebases.
  • Use cases like audio and video processing have seen the fastest real-world adoption of AI at the edge.
  • Caution is warranted when integrating AI into safety-critical systems, where determinism is crucial.
  • Cloud-to-device AI models are becoming the go-to for fleet operations, anomaly detection, and predictive maintenance.
  • Many promising LLM-based consumer products struggle because hardware constraints and cloud dependence create friction.
  • The future of embedded AI may lie in hybrid architectures that balance on-device intelligence with cloud support.

Chapters:

00:00 Episode Teasers & Welcome

01:10 Meet the Panel: Memfault x Golioth

02:56 Why AI at the Edge Isn’t Actually New

05:33 The Real Use Cases for AI in Embedded Devices

08:07 How Much Chaos Are You Willing to Introduce?

11:19 Edge AI vs. Cloud AI: Where It’s Working Today

13:50 LLMs in Embedded: Promise vs. Reality

17:16 Why Hardware Can’t Keep Up with AI’s Pace

20:15 Building Unique Models When Public Datasets Fail

36:14 Open Source’s Big Moment (and What Comes Next)

42:49 Will AI Kill Open Source Contributions?

49:30 How AI Could Change Software Supply Chains

52:24 How to Stay Relevant as an Engineer in the AI Era

⁠⁠Join the Interrupt Slack

Watch this episode on YouTube

⁠Suggest a Guest⁠

Follow Memfault

Other ways to listen:

⁠⁠Apple Podcasts

iHeartRadio⁠⁠

⁠⁠Amazon Music

GoodPods

Castbox

⁠⁠

Next Episode

undefined - #009: Zephyr’s Meteoric Rise and What It Means for the Future of Embedded

#009: Zephyr’s Meteoric Rise and What It Means for the Future of Embedded

In today’s Coredump Session, we dive into the origins and evolution of Zephyr RTOS with Kate Stewart, VP of Dependable Embedded Systems at the Linux Foundation. From Intel’s early ambitions to a thriving global community, Kate unpacks how Zephyr grew into a leading open-source RTOS and what makes it uniquely resilient and developer-friendly. This conversation also explores the technical shifts shaping embedded development and how governance, safety, and collaboration continue to steer Zephyr’s trajectory.

Speakers:

  • Kate Stewart: Vice President of Dependable Embedded Systems, The Linux Foundation
  • François Baldassari: CEO & Founder, Memfault
  • Thomas Sarlandie: Field CTO, Memfault

Key Takeaways:

  • Zephyr was born from Intel’s desire for a scalable, secure, and open RTOS, evolving from Wind River roots.
  • Early adoption of Linux-inspired practices, like Kconfig and "signed-off-by" contributions, lowered friction and encouraged community participation.
  • The project’s governance model, emphasizing multi-vendor participation and elected leadership, prevents corporate capture and boosts resilience.
  • Zephyr’s pragmatic reuse of tools like MCUboot accelerated development and expanded capabilities.
  • Long-term support (LTS) releases—now extended to five years—make Zephyr production-friendly and aligned with regulatory demands like the CRA.
  • Innovations like the Twister test framework and open testing infrastructure set Zephyr apart for visibility and maintainability.
  • Zephyr thrives as complexity in embedded systems increases, filling the gap left by simpler RTOSes ill-suited for modern MCU workloads.
  • Not every project is a fit for Zephyr—especially ultra-low-end 8-bit systems—but it excels in growing, connected device classes.

Chapters:

00:00 Introduction and Guest Introduction

04:12 Building Zephyr: Intel’s Open RTOS Bet

06:39 Governance That Guards Against Capture

08:10 Borrowing From Linux, Avoiding Its Baggage

09:41 What Makes Zephyr Different

13:55 Zephyr in Production: LTS and Real-World Adoption

16:15 Scaling with Twister and QEMU

18:15 Taming Complexity Without Losing Performance

35:45 SBOMs and the Future of Compliance

38:20 A Head Start on Security Standards

43:02 Inside Zephyr's Safety Certification Journey

46:44 Real-World Use Cases and Industry Uptake

50:25 What's Next for Zephyr and the RTOS Landscape

53:12 Final Reflections and Closing Thoughts

⁠⁠Join the Interrupt Slack

Watch this episode on YouTube

⁠Suggest a Guest⁠

Follow Memfault

Other ways to listen:

⁠⁠Apple Podcasts

iHeartRadio⁠⁠

⁠⁠Amazon Music

GoodPods

Castbox

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/coredump-sessions-668730/008-navigating-the-changing-iot-security-landscape-a-survival-guide-fo-91246563"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to #008: navigating the changing iot security landscape: a survival guide for product leaders on goodpods" style="width: 225px" /> </a>

Copy