Security

140 articles
Security Response Management: Risk, Cost, and Best Practices in an Imperfect World

Security Response Management: Risk, Cost, and Best Practices in an Imperfect World

By David Reyna Keeping our products secure is a requirement for survival, demanding vigilance in finding, applying, and distributing working patches to our customers in the timeliest manner possible. While there is heightened awareness about device vulnerabilities, what is often missing is awareness about the process of managing the security response process itself. Community security vulnerability data is available, but…
Meeting FDA Regulations to Update Medical Devices for Safety and Security

Meeting FDA Regulations to Update Medical Devices for Safety and Security

By Jeff Kataoka Protecting patients and promoting public health is a key directive for the U.S. Food & Drug Administration (FDA). This directive includes oversight on the safe and secure use of medical devices for patient care. That means that if you are a medical device manufacturer, your company needs to ensure that its medical device is meeting FDA regulations…
Reliable, Safe and Secure? Ada and VxWorks Can Help!

Reliable, Safe and Secure? Ada and VxWorks Can Help!

By guest contributor Ben Brosgol, Senior Technical Staff, AdaCore Writing reliable, safe and secure software is tough. Doing it for for hard real-time systems with demanding certification requirements -- such as DO-178B or DO-178C for avionics -- is tougher and indeed is one of the most daunting challenges that a developer has to face. Meeting this challenge calls for experience-hardened…
The Critical Infrastructure Challenge: Developing and Supporting Software for the Long Term

The Critical Infrastructure Challenge: Developing and Supporting Software for the Long Term

By Gareth Noyes Software content is increasing in every realm of technology, and has been the catalyst for the explosive growth of entirely new market sectors. The development and deployment of software at scale has matured significantly over the last decade in enterprise- and cloud-IT applications. This has been enabled, among other factors, by: Uniformity of computing infrastructure (think of…
New Performance Breakthrough for VxWorks-based HPEC Systems

New Performance Breakthrough for VxWorks-based HPEC Systems

By guest contributor Michelle Watson, Marketing Product Portfolio Manager, Curtiss-Wright Defense Solutions For years, designers of High Performance Embedded Computing (HPEC) systems have sought to free up critical resources and establish optimal performance for Intelligence, Surveillance and Reconnaissance (ISR) applications.  Today, system designers can take full advantage of the Intel® Xeon® D processor architecture for their multi-core/multi-board HPEC systems using…
VxWorks: Past and Future

VxWorks: Past and Future

By Andreea Volosincu The year is 2002. Brazil is winning the FIFA World Cup and the first cell phone to have a built-in camera is released in the US – yes, this story is THAT old. In the world of secure and reliable systems, Wind River releases VxWorks 5.5. Fast forward 16 years, VxWorks® 5.5 reaches its End-of-Life (EOL) status…
Software Considerations and Security Requirements for Medical Devices

Software Considerations and Security Requirements for Medical Devices

By guest contributor Daniela Previtali, Global Marketing Director, Wibu-Systems Software has become ubiquitous in the healthcare industry given its widespread use for controlling medical devices and health information systems and communicating and maintaining electronic patient data, all in an increasingly connected environment. For embedded system developers, in particular, choosing the software best suited for the design of the medical device and its…
Wind River and Rockwell Collins Bring Open Architectures from Planning to Production

Wind River and Rockwell Collins Bring Open Architectures from Planning to Production

By Chip Downing Although many military aircraft suppliers, armed services, and government organizations have been promoting Open Architecture (OA) and Modular Open Systems Architecture (MOSA) for years, it has been somewhat difficult to find really good implementations of open architectures in shipping, fielded products.   Many companies simply tend to create and update purpose-built platforms that are the legacy of almost…
When AI Goes Bad

When AI Goes Bad

By Mychal McCabe The Future of Humanity Institute recently followed up on last year's survey about AI exceeding human performance in a variety of tasks, with a report titled "The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation." The report focuses on three macro changes to the threat landscape: expansion of existing threats, introduction of new threats, and a…
Choosing the Right System Software for Medical Devices

Choosing the Right System Software for Medical Devices

By Jeff Kataoka The advances in healthcare, therapies and medical technologies are moving forward at an unbelievable pace. I’m amazed at how the treatments and technology can change so quickly, even from one year to the next. Recently, I witnessed how knee replacement surgery and the treatments can change over just fourteen months. I’ve witnessed new methods of providing anesthesia…