Security

134 articles
Wind River Advances Industrial IoT with Secure Device Lifecycle Management

Wind River Advances Industrial IoT with Secure Device Lifecycle Management

By Keith Shea Industrial IoT (IIoT) can only generate value for customers if connected devices are actively monitored and managed. To ensure these devices are secure, operational, and performing at the highest possible level, device management should be designed in as part of an IoT system architecture from the start, as it is a key IoT enabler and critically important…
Tackling IoT Security with New Wind River Services Offering

Tackling IoT Security with New Wind River Services Offering

By Amit Ronen Security is the number one issue facing IoT deployments and must be properly addressed before broad adoption can begin. Cybersecurity has become a high priority for IT systems, yet there continue to be major security breaches, such as the hacks of major organizations including Anthem, Home Depot, the U.S. Office of Personnel Management, Sony, Target, and the…
No Compromises on Security when Virtualizing Industrial Control Applications

No Compromises on Security when Virtualizing Industrial Control Applications

By Charlie Ashton As long as you select the right software platform, virtualization will bring a wide range of benefits to your industrial control application without compromising on the level of security delivered by traditional physical infrastructure. Moreover, virtualization will enhance your system-level security by enabling dynamic updates in response to emerging threats. In industries such as energy, manufacturing, healthcare…
Doubling Down on Security

Doubling Down on Security

By Ron Breault “You guys are truly leading the industry!” We recently achieved the general availability milestone for the latest release of our Wind River Titanium Cloud product family.  While this release is brimming with new features and functionality, we especially “doubled down” on security across the products in our Titanium Cloud portfolio.  Moving the security yard sticks to stay…
GrammaTech CodeSonar Brings the Power of Advanced Static Analysis to Wind River Workbench

GrammaTech CodeSonar Brings the Power of Advanced Static Analysis to Wind River Workbench

The integration of GrammaTech CodeSonar with Wind River Workbench enables software developers to annotate and resolve the bugs and software vulnerabilities that CodeSonar highlights without leaving the Wind River Workbench development environment, thereby significantly boosting productivity. Supporting the native Wind River VxWorks® real-time operating system as well as the POSIX API, CodeSonar provides advanced, whole program static analysis of application…
Aviation Electronics Europe, ARINC653 & Multi-core Certification

Aviation Electronics Europe, ARINC653 & Multi-core Certification

By Paul Parkinson Last week, I attended the Aviation Electronics Europe 2017 conference, which was held in Munich for the third consecutive year. It’s a popular location due to its excellent transport links, Bavarian cuisine, and of course weissbier. The theme of this year’s conference was ‘Staying Ahead of the Competition in a Growth Market’, and the keynote presentations covered…
Securing the E-Enabled Aircraft

Securing the E-Enabled Aircraft

By Alex Wilson Aviation Electronics Europe has just finished in Munich. The show continues to grow and this year was no exception, with some interesting keynotes from EASA and Airline for Europe, A4E. I noticed the UK standing out in Europe (no surprise there) for being having the highest Passenger Tax across all the European countries! I was presented a…
What is the Response to Security Incidents in the Embedded World?

What is the Response to Security Incidents in the Embedded World?

By Tim Radzykewycz It is simply a reality that no computer system is impervious to threat or some sort of compromise.  However, it is an industry best practice to deploy Intrusion Detection Systems (IDS) to detect intrusions, have rapid access to an Incident Response Team (IRT) to investigate the intrusion, and have a plan on how to deal with certain,…
IoT Security – The Next Generation of Social Responsibility

IoT Security – The Next Generation of Social Responsibility

By Neil McLellan In response to recent events, the White House and the National Institute of Standards and Technology (NIST) have just released the much awaited and polished guidance around cyber security for the Internet of Things (IoT). Over the past several months, connected devices have been the focal point after several crippling attacks on various ISPs, known as distributed…
Prevent human error in security: Dave meet STIG, STIG meet Dave

Prevent human error in security: Dave meet STIG, STIG meet Dave

By Tim Radzykewycz Recently, I ran across a cartoon about software security by John Klossner.  It shows a boxing ring, with assorted security software in one corner, and in the other corner was a guy wearing a shirt labelled "Human Error."  I had seen this cartoon before.  But for some reason, it touched off a reaction this time. Credit: 2006…