Security

135 articles
VxWorks: Past and Future

VxWorks: Past and Future

By Andreea Volosincu The year is 2002. Brazil is winning the FIFA World Cup and the first cell phone to have a built-in camera is released in the US – yes, this story is THAT old. In the world of secure and reliable systems, Wind River releases VxWorks 5.5. Fast forward 16 years, VxWorks® 5.5 reaches its End-of-Life (EOL) status…
Software Considerations and Security Requirements for Medical Devices

Software Considerations and Security Requirements for Medical Devices

By guest contributor Daniela Previtali, Global Marketing Director, Wibu-Systems Software has become ubiquitous in the healthcare industry given its widespread use for controlling medical devices and health information systems and communicating and maintaining electronic patient data, all in an increasingly connected environment. For embedded system developers, in particular, choosing the software best suited for the design of the medical device and its…
Wind River and Rockwell Collins Bring Open Architectures from Planning to Production

Wind River and Rockwell Collins Bring Open Architectures from Planning to Production

By Chip Downing Although many military aircraft suppliers, armed services, and government organizations have been promoting Open Architecture (OA) and Modular Open Systems Architecture (MOSA) for years, it has been somewhat difficult to find really good implementations of open architectures in shipping, fielded products.   Many companies simply tend to create and update purpose-built platforms that are the legacy of almost…
When AI Goes Bad

When AI Goes Bad

By Mychal McCabe The Future of Humanity Institute recently followed up on last year's survey about AI exceeding human performance in a variety of tasks, with a report titled "The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation." The report focuses on three macro changes to the threat landscape: expansion of existing threats, introduction of new threats, and a…
Choosing the Right System Software for Medical Devices

Choosing the Right System Software for Medical Devices

By Jeff Kataoka The advances in healthcare, therapies and medical technologies are moving forward at an unbelievable pace. I’m amazed at how the treatments and technology can change so quickly, even from one year to the next. Recently, I witnessed how knee replacement surgery and the treatments can change over just fourteen months. I’ve witnessed new methods of providing anesthesia…
Spectre and Meltdown – How to Respond in the Embedded World

Spectre and Meltdown – How to Respond in the Embedded World

By Tim Skutt The past few weeks have included a whirlwind of speculation and revelations around a new set of security issues known as Spectre and Meltdown.  Collectively, these issues impact most of the major processor architectures and implementations, prompting the cross-cutting question – “what should I do about these issues?” Much of the initial information available focuses on answering…
VxWorks Secure Boot

VxWorks Secure Boot

By Ka Kay Achacoso The massive internet outage last year in the United States blocked millions of users from access to the most popular sites on the internet. Suddenly, we learned that common consumer devices like cameras, printers, and DVRs participated in attacking the DNS infrastructure with denial of service attacks.  This internet outage was repeated later in Europe and…
Cybersecurity:  The Importance of Protecting Data at Rest with VxWorks

Cybersecurity: The Importance of Protecting Data at Rest with VxWorks

By Ka Kay Achacoso A few months ago, Equifax had a data breach that exposed to hackers the names, social security numbers, credit card numbers, driver’s license numbers, and other sensitive personal information and resulted in a total of 145.5 million consumers impacted by this cyber security breach  after the forensic investigation concluded.  The resulting outcry from potentially affected businesses…
Wind River Advances Industrial IoT with Secure Device Lifecycle Management

Wind River Advances Industrial IoT with Secure Device Lifecycle Management

By Keith Shea Industrial IoT (IIoT) can only generate value for customers if connected devices are actively monitored and managed. To ensure these devices are secure, operational, and performing at the highest possible level, device management should be designed in as part of an IoT system architecture from the start, as it is a key IoT enabler and critically important…
Extracting IIoT Value at the Edge

Extracting IIoT Value at the Edge

Guest blog by Greenwave's Artur Menzeleev Internet of Things (IoT) edge analytics is experiencing a dramatic upsurge in interest. The impact of moving analytics to the edge is showing its potential in industrial automation, industrial asset optimization, and industrial IoT (IIoT) deployments. As both hardware processing and software analytics get more powerful at the edge, the industry has begun shifting the traditional…