embedded security | Wind River Skip to main content
Wind River Wind River
  • Products

    Wind River Platforms »

    • VxWorks
      • VxWorks 7
      • VxWorks Cert
      • VxWorks 653
    • Wind River Cloud Platform
      • Wind River Conductor
      • Wind River Analytics
      • Wind River OpenStack
    • eLxr Pro
    • Helix Virtualization Platform
    • Wind River Linux
    • Zephyr

    Wind River Studio Tools »

    • DEVELOP
      • Workspace
        Streamlines provisioning and configuration of development environments
      • Diab Compiler
      • Pipelines
        Customization and scalability for your DevSecOps pipelines
    • TEST
      • Test Automation
        Framework to automate testing during software development
      • Virtual Lab
        Tool to simulate hardware behaviors when testing software
      • Intel® Simics®
    • MANAGE
      • OTA Updates
        Remote and secure orchestration of multi-device software updates
      • Conductor
        End-to-end automation to orchestrate containers across edge devices
    • MONITOR
      • Digital Feedback Loop
        Platform to conduct analytics on collected edge device data
      • Analytics
        Data pipeline to send edge device data to the cloud
  • Industries

    Industries

    • Industry Col Left
      • Aerospace & Defense
      • Automotive
      • Energy
      • Enterprise
    • Industry Col Right
      • Industrial
      • Medical
      • Startups
      • Telecommunications
    Customer Stories

    Examples of how our solutions have helped customers achieve their goals.

    Start Exploring
  • Insights

    Insights

    • Insights Col Left
      • Articles/Blogs
      • Guides to Intelligent Systems
      • Use Cases
    • Insights Col Right
      • White Papers
      • Web Seminars & Events
    Learning Subscription

    Flexible On-Demand Learning Solutions

    Start Exploring
  • Services

    Wind River Services »

    • CAPABILITIES
      • Design Services
      • Lifecycle Management Services
      • Managed Services
      • Safety & Certification Services
      • Security Services
      • Education Services
    • PACKAGES
      • Wind River Linux Services
      • Wind River Acceleration Program
      • Wind River Zephyr Solutions
    Wind River Learning Subscription

    Choose a single product stream or mix & match bundles for cost-effective learning options!

    Upgrade Your Team’s Skills
  • Security

    Security

    • SECURITY
      • Security Center
      • Linux Security Scanner
      • Secure Development Lifecycle
    • Response
      • PSIRT
      • Vulnerability Responses
      • CVE Database
    Security Center

    Get the latest alerts, CVE updates, and security information.

    Stay Informed
  • Support

    Support

    • SUPPORT
      • Wind River Support Network
      • Product Documentation
    • Learning
      • Wind River Learning
      • Enhanced Support Offerings
    Support Network

    Access documentation, download software, submit request, & more.

    Get Support
  • About

    About Wind River »

    • ABOUT US
      • Newsroom
      • Awards
      • Executive Leadership Team
      • Customer Stories
      • Partners
      • Careers
      • University Program
    • CONTACT US
      • hidden-item
    The Intelligent Systems Future Is Ours to Build Together
Search Search Shop Shop Contact Contact

Wind River Blog

Tag:
embedded security

10 articles
Back to blog
SDL

Wind River Secure Development Lifecycle

With the ongoing menace of bad actors threatening national security, corporate data, and valuable intellectual property, the need for secure software development has never been...
1 year 4 months ago

Top Five Variables Influencing the Approach to Device Security

In my previous blog post , I covered the importance of having security built in and not bolted on. In this blog post, I’ll outline the top five key variables that are influencing...
12 years 3 months ago

Simplifying the Security Approach

As a security professional in the business of helping Wind River customers protect their systems from malicious intent I am frequently asked how they should approach security. Here...
12 years 11 months ago

Improving Embedded Operating System Security Part 6: Harden the System Against Attack

In the previous posts I’ve discussed various steps that need to be taken in order to improve security, but these are all preventative measures that require validation before a...
13 years 1 month ago

Improving Embedded Operating System Security Part 5: Securing Code and Data

Secure the Boot and Execution Embedded systems are vulnerable at boot time. For example, it’s common for hobbyists to re-flash consumer products’ firmware to change the way it...
13 years 1 month ago

Improving Embedded Operating System Security Part 3: Secure Your Network Communication

Many security issues with embedded systems stem from their connection via a network with access open to a large population (enterprise network) or even directly to the Internet...
13 years 2 months ago

Improving Embedded Operating System Security Part 2: Enable a More Secure Configuration

Despite the hype surrounding the state of embedded security, many of the runtime platforms that these systems are based on can be made more secure through proper configuration...
13 years 2 months ago

Improving Embedded Operating System Security

Security has quickly risen to the top of mind for embedded developers in the last year. Although the Stuxnet worm was a wake up call for the embedded industry, there have been...
13 years 2 months ago

Five Steps to Improving Embedded System Security

Embedded device security needs to be integrated into the development lifecycle of the product rather than being an afterthought. The following are high level guidelines that...
13 years 7 months ago

The new front in cyber warfare: embedded systems

At the recent Take Down Conference, a scheduled talk on security vulnerabilities in SCADA (Supervisory Control And Data Acquisition) systems was cancelled due to direct requests...
13 years 11 months ago

Wind River Blog

The Wind River Blog is made up of a variety of voices: executives, technologists and industry enthusiasts. We hope to foster conversations and encourage the sharing of insights regarding the evolving landscape of intelligent, connected systems with our ecosystem of customers, partners and colleagues.

Get our RSS feed

Subscribe

Enter your email address to receive notifications of new posts.

Popular Tags

Wind RiverVxWorksAerospace & DefenseLinux / Open SourceLinuxNetworkingSoftware EngineeringSecurityOpen SourceSimicsMulti-coreEclipseNFVIoT / M2MTools & SimulationvirtualizationIndustrial

Disclaimer

The postings on this site are the views of the individual poster and do not represent Wind River's positions, strategies or opinions. This site is subject to Wind River’s Terms of Use.

Products

  • Platforms
    • VxWorks
    • eLxr Pro
    • Wind River Cloud Platform
    • Helix Virtualization Platform
    • Wind River Linux
    • Zephyr
  • Studio Tools
    • Workspace
    • Diab Compiler
    • Pipelines
    • Test Automation
    • Virtual Lab
    • Intel® Simics®
    • OTA Updates
    • Conductor
    • Digital Feedback Loop
    • Analytics

Industries

  • Aerospace & Defense
  • Automotive
  • Energy
  • Enterprise
  • Industrial
  • Medical
  • Startups
  • Telecommunications

Security

  • Security Center
  • Vulnerability Responses
  • Linux Security Scanner
  • CVE Database

Explore

  • Resource Library
  • Intelligent Systems Research
  • Web Seminars & Events
  • Wind River Blog
  • Customer Stories
  • Learning Subscription
  • Guides to Intelligent Systems

Support

  • Wind River Support
  • Product Documentation

About

  • About Wind River
  • Newsroom
  • Awards
  • Executive Leadership Team
  • Partners
  • Careers
  • University Program
Support
Contact Us
Compliance at Wind River  | Privacy  | Feedback |
Country
U.S. Japan China

© 2025 Wind River Systems, Inc.
Facebook Twitter Linkedin Youtube