The Vulnerability of Things - IOSS 21

We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices...
1 min read
Last updated January 17, 2023

 

Leave a review for our podcast & we'll send you a pack of infosec cards.


We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things.

In this episode, Ken reveals the potential security risks in a multitude of IoT devices – cars, thermostats, kettle and more. We also covered GDPR, Privacy by Design and asked if Ken thinks “The Year of Vulnerabilities” will be hitting headlines any time soon.

Munro runs Pen Testing Partners, a firm that focuses on penetration testing on the Internet of Things. He’s a regular on BBC, and most recently, he was interviewed by one of our bloggers, Andy Green.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

ai-isn’t-the-risk,-uncontrolled-ai-is
AI Isn’t the Risk, Uncontrolled AI Is
Discover what it takes to secure AI and why most approaches fall short.
the-map-is-not-the-territory:-the-impact-of-anthropic-mythos-on-data-security
The Map is Not the Territory: The Impact of Anthropic Mythos on Data Security
Claude Mythos is a meaningful moment. But the real danger isn't the explosion of CVEs. It's what attackers find when they exploit them.
varonis-recognized-as-a-leader-in-g2’s-spring-2026-reports,-including-new-data-security-posture-management-category
Varonis Recognized as a Leader in G2’s Spring 2026 Reports, Including New Data Security Posture Management Category
Varonis has been recognized by G2 as a leader in data security, demonstrating its ability to help organizations secure data and control AI access.
how-cybercriminals-buy-access:-logins,-cookies,-and-backdoors
How Cybercriminals Buy Access: Logins, Cookies, and Backdoors
Explore how cybercriminals buy VPN credentials, infostealer logs, breach databases, and web shells to access networks without writing a single exploit.