Improving Embedded Operating System Security Part 2: Enable a More Secure Configuration

By Bill Graham

Bill Graham

 Despite the hype surrounding the state of embedded security, many of the runtime platforms that these systems are based on can be made more secure through proper configuration. Moreover, it’s important to keep the platform updated since the RTOS likely has many security vulnerabilities fixed that were present in older versions.  Default configurations for embedded operating systems are often tuned for performance and memory footprint and have various features off by default.

Continue reading >>

 

Tweet about this on TwitterShare on Google+Share on FacebookShare on LinkedInEmail this to someone