In this episode of the IoT For All Podcast Sternum Chief Business Officer and Co-Founder Boaz Shedletsky joins us to talk about cybersecurity in the IoT space, including the security obstacles to widespread adoption and the need for on-device security in the majority of devices.
Boaz is an experienced tech entrepreneur. Prior to co-founding Sternum, Boaz served as co-founder & CEO of ForClass until it was acquired by Time To Know. Before that, he held the role of Chief of Business Development at the Center for Educational Technology, Israel’s market leader in innovative education. Boaz’s accomplishments include the launch of McGraw-Hill Professional’s B2B e-book library and Ivy MBA Consulting, a leading company aiding international students with their application process to top-tier business schools.
Interested in connecting with Boaz? Reach out to him on Linkedin!
About Sternum: Sternum, the multilayered cybersecurity platform offering real-time, embedded protection for IoT devices, was founded in 2018 by a team of highly experienced research, development, and business leaders, many coming from the Israeli Defense Forces’ (IDF) elite 8200 unit. With a profound understanding of embedded systems, deep insights into defenders’ and attackers’ mindsets, and a goal of creating a new standard of cybersecurity for IoT devices, Sternum is building uncompromising, innovative technology.
Key Questions and Topics from this Episode:
(00:48) Introduction to Boaz Shedletsky
(04:08) How was Sternum founded? What problem were you seeking to solve?
(09:46) Can you share some Applications?
(12:06) What’s your current view of the cybersecurity landscape in IoT?
(15:28) What are the biggest challenges companies coming to you are facing?
(17:46) Is the cybersecurity aspect of IoT mature enough for mass IoT adoption?
(19:37) Why do you think companies neglect the security component of these devices and solutions?
(21:56) Why is on-device security so important? And do you have any advice for companies developing IoT solutions in regards to their security components?