Archive For February, 2013

3 articles

Top Five Variables Influencing the Approach to Device Security

By AJ Shipley In my previous blog post, I covered the importance of having security built in and not bolted on.  In this blog post, I’ll outline the top five key variables that are influencing how we approach device security -- a topic particularly top of mind as I spend this week at the RSA Conference. 1. Connectivity to the enterprise…

Analyze this…Accelerate that…

By Steve Konish In just three short months, the engineering team at Wind River has added new, amazing capabilities to the Wind River Intelligent Network Platform.  These enhancements to the platform allow applications to go even deeper and faster than ever before.     When we first launched the platform, it included two data plane engines for packet acceleration and pattern matching.  The…

Security Must be Built In…Or Else

By AJ Shipley Security cannot be bolted on, it must be built in.  This statement proves to be especially true when considering the recent hack of the New York Times, where during a four-month long cyberattack by Chinese hackers, the company's antivirus system from Symantec missed 44 of the 45 pieces of malware installed by attackers on the network.  Cases like this…