Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsFirmware Scanning Time, Cost, and Where Teams Run EMBA
Firmware Scanning Time, Cost, and Where Teams Run EMBA
Cybersecurity

Firmware Scanning Time, Cost, and Where Teams Run EMBA

•January 14, 2026
0
Help Net Security
Help Net Security•Jan 14, 2026

Companies Mentioned

Microsoft

Microsoft

MSFT

Why It Matters

The findings give security teams concrete data to choose between on‑premise and cloud deployments, balancing budget, scalability, and investigative depth.

Key Takeaways

  • •EMBA scans show consistent results across local and cloud
  • •Cloud runs cost several hundred dollars for limited scans
  • •Firmware structure, not size, drives scan duration
  • •Decompilation and extraction dominate runtime on both platforms
  • •Hybrid model balances scale with deep local analysis

Pulse Analysis

Firmware security teams spend countless hours running EMBA scans to uncover vulnerabilities in IoT devices. The tool’s comprehensive extraction, static analysis, and dynamic checks are essential, yet the process often stretches into full workdays, straining compute resources and delaying remediation. Understanding where and how EMBA should be deployed—whether on a dedicated workstation or in a cloud environment—has become a strategic question for organizations that must protect increasingly complex firmware ecosystems.

The study examined identical EMBA configurations on a local Linux box and an Azure VM matched for CPU and memory. Results showed near‑identical run times and findings across repeated executions, confirming the tool’s repeatability. However, cloud scans generated several hundred dollars in usage fees for a modest sample set, highlighting the financial impact of on‑demand resources. Module‑level profiling revealed that decompilation, deep extraction, and text‑search operations dominate runtime regardless of platform, while other modules complete quickly. Notably, firmware internal layout—compression schemes, filesystem types, and embedded components—proved a stronger predictor of scan length than raw image size.

For practitioners, the data suggests a hybrid deployment model: use cloud instances for high‑throughput triage of large firmware collections, then shift selected images to a controlled on‑premise system for detailed analysis and validation. This approach maximizes scalability, contains costs, and preserves the repeatable environment needed for forensic accuracy. As IoT adoption accelerates, organizations that align their EMBA strategy with these operational insights will achieve faster vulnerability detection while maintaining budget discipline.

Firmware scanning time, cost, and where teams run EMBA

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...