Security

131 articles
Doubling Down on Security

Doubling Down on Security

By Ron Breault “You guys are truly leading the industry!” We recently achieved the general availability milestone for the latest release of our Wind River Titanium Cloud product family.  While this release is brimming with new features and functionality, we especially “doubled down” on security across the products in our Titanium Cloud portfolio.  Moving the security yard sticks to stay…
GrammaTech CodeSonar Brings the Power of Advanced Static Analysis to Wind River Workbench

GrammaTech CodeSonar Brings the Power of Advanced Static Analysis to Wind River Workbench

The integration of GrammaTech CodeSonar with Wind River Workbench enables software developers to annotate and resolve the bugs and software vulnerabilities that CodeSonar highlights without leaving the Wind River Workbench development environment, thereby significantly boosting productivity. Supporting the native Wind River VxWorks® real-time operating system as well as the POSIX API, CodeSonar provides advanced, whole program static analysis of application…
Aviation Electronics Europe, ARINC653 & Multi-core Certification

Aviation Electronics Europe, ARINC653 & Multi-core Certification

By Paul Parkinson Last week, I attended the Aviation Electronics Europe 2017 conference, which was held in Munich for the third consecutive year. It’s a popular location due to its excellent transport links, Bavarian cuisine, and of course weissbier. The theme of this year’s conference was ‘Staying Ahead of the Competition in a Growth Market’, and the keynote presentations covered…
Securing the E-Enabled Aircraft

Securing the E-Enabled Aircraft

By Alex Wilson Aviation Electronics Europe has just finished in Munich. The show continues to grow and this year was no exception, with some interesting keynotes from EASA and Airline for Europe, A4E. I noticed the UK standing out in Europe (no surprise there) for being having the highest Passenger Tax across all the European countries! I was presented a…
What is the Response to Security Incidents in the Embedded World?

What is the Response to Security Incidents in the Embedded World?

By Tim Radzykewycz It is simply a reality that no computer system is impervious to threat or some sort of compromise.  However, it is an industry best practice to deploy Intrusion Detection Systems (IDS) to detect intrusions, have rapid access to an Incident Response Team (IRT) to investigate the intrusion, and have a plan on how to deal with certain,…
IoT Security – The Next Generation of Social Responsibility

IoT Security – The Next Generation of Social Responsibility

By Neil McLellan In response to recent events, the White House and the National Institute of Standards and Technology (NIST) have just released the much awaited and polished guidance around cyber security for the Internet of Things (IoT). Over the past several months, connected devices have been the focal point after several crippling attacks on various ISPs, known as distributed…
Prevent human error in security: Dave meet STIG, STIG meet Dave

Prevent human error in security: Dave meet STIG, STIG meet Dave

By Tim Radzykewycz Recently, I ran across a cartoon about software security by John Klossner.  It shows a boxing ring, with assorted security software in one corner, and in the other corner was a guy wearing a shirt labelled "Human Error."  I had seen this cartoon before.  But for some reason, it touched off a reaction this time. Credit: 2006…
Software Containment in VxWorks:  VxPOD – A Separation Alternative to Virtualization

Software Containment in VxWorks: VxPOD – A Separation Alternative to Virtualization

By Ka Kay Achacoso The challenge in hardware consolidation for real-time embedded systems is ensuring that sub-systems don’t interfere with each other.   To take advantage of the space and hardware cost reduction that comes with hardware consolidation, some systems use virtualization technology to separate sub-systems from each other.  With Virtualization, a hypervisor is run either on the hardware (Type 1…
When is an IoT Botnet not an IoT Botnet?

When is an IoT Botnet not an IoT Botnet?

By Mychal McCabe IoT botnets continue to make news, with new strains of malware infecting a range of internet-connected devices and then using those devices to participate in historically large distrubuted denial of service (DDoS) attacks. By some estimates the Mirai strain of malware has infected over one million devices since it emerged, with more to come following its release…
Immunization Against the IoT Zombie Horde

Immunization Against the IoT Zombie Horde

By Alex deVries and Tim Skutt IoT zombies are out there. There are a lot of them. We won’t be rid of them soon. They will be reaching out to your device, so it’s important to take steps now to immunize it so your device won’t suffer. In a previous blog, “IoT Zombies are Eating the Internet,” we dug into recent…