• Platform
      • Platform Overview
      • Protect critical software, firmware, and hardware in enterprise and national infrastructure.
      • Learn More
      • Eclypsium Protects:
        • User Endpoints
        • Servers
        • Network Devices
        • AI Hardware
      • Featured post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Solutions
      • Solutions Overview
      • Build trust in every critical asset in your enterprise.
      • Read More
      • By Business Need
        • Device Lifecycle Security
        • Firmware Security
        • Hardware Supply Chain Security
        • Regulatory Compliance
      • -
        • Continuous Threat Exposure Management (CTEM)
        • Ransomware Defense
        • Zero Trust
          for Endpoints
      • By Industry
        • Energy and Utilities
        • Financial Services
        • Government
        • Telecommunications
      • Featured Post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Resources
      • All Resources
      • Learn More
      • Case Studies
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • Solution Briefs
      • Reports and eBooks
      • White Papers
      • Blog
      • Newsletter
      • Support
      • Latest Blogs
        Blog

        Fortinet Under Fire: Why Your Network Edge Remains Attackers' Favorite Entry Point

        Learn more
        Blog

        We X-Rayed A Suspicious FTDI USB Cable

        Learn more
  • Research
  • Company
      • Company Overview
      • We exist to defend the foundation of enterprise and national infrastructure.
      • Learn More
      • Team
      • Newsroom
      • Careers
      • Partners
      • Security and Trust
      • Contact
  • US
  • JP
  • Get a demo
  • Take a Tour
  • US
  • JP
  • Get a demo
  • Take a Tour
  • Platform
      • Platform Overview
      • Protect critical software, firmware, and hardware in enterprise and national infrastructure.
      • Learn More
      • Eclypsium Protects:
        • User Endpoints
        • Servers
        • Network Devices
        • AI Hardware
      • Featured post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Solutions
      • Solutions Overview
      • Build trust in every critical asset in your enterprise.
      • Read More
      • By Business Need
        • Device Lifecycle Security
        • Firmware Security
        • Hardware Supply Chain Security
        • Regulatory Compliance
      • -
        • Continuous Threat Exposure Management (CTEM)
        • Ransomware Defense
        • Zero Trust
          for Endpoints
      • By Industry
        • Energy and Utilities
        • Financial Services
        • Government
        • Telecommunications
      • Featured Post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Resources
      • All Resources
      • Learn More
      • Case Studies
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • Solution Briefs
      • Reports and eBooks
      • White Papers
      • Blog
      • Newsletter
      • Support
      • Latest Blogs
        Blog

        Fortinet Under Fire: Why Your Network Edge Remains Attackers' Favorite Entry Point

        Learn more
        Blog

        We X-Rayed A Suspicious FTDI USB Cable

        Learn more
  • Research
  • Company
      • Company Overview
      • We exist to defend the foundation of enterprise and national infrastructure.
      • Learn More
      • Team
      • Newsroom
      • Careers
      • Partners
      • Security and Trust
      • Contact
PODCASTS

BTS #7 - Nicholas Starke

By: Eclypsium
April 5, 2023
Eclypsium presents Below The Surface text on top of ocean waves

Discuss current events in firmware security, such as the techniques utilized in BlackLotus. We will compare Baton Drop with Grub2 capabilities.

Segment Resources: https://starkeblog.com/

Show Notes: https://securityweekly.com/bts7

Subscribe

Back to Blog
Related Blogs
View all
PODCASTS

BTS #67 - BIOS Password Cracking, Secure Boot, and Stackwarp

Read more
PODCASTS

BTS #66 - Beyond the Label: The Truth About Hardware Trust

Read more
PODCASTS

BTS #65 - Exploring AI in Firmware Analysis

Read more
PODCASTS

BTS #64 - Patching, Evil AI, Supply Chain Breaches

Read more
Eclypsium | Supply Chain Security for the Modern Enterprise
Get a Demo Contact Us
Platform
  • Title
    • Supply Chain Security
    • Supply Chain Intelligence
Research
Solutions
  • Title
    • Digital Supply Chain Security
    • Firmware Protection for Enterprises
    • Compliance
    • Zero Trust for Endpoints
Resources
  • Title
    • Blog
    • Events
    • Podcasts
    • White Papers
    • Support
  • Title
    • Solution Briefs
    • Threat Reports
    • Newsletter
Company
  • Title
    • Team
    • Newsroom
    • Careers
    • Partners
    • Security
    • Contact
  • Linkedin
  • Youtube
  • Twitter
  • Facebook
© 2025 Eclypsium, Inc.
Privacy Policy | Terms of Use | Sitemap