Security

162 articles
Urgent/11 Further Boosts VxWorks Security

Urgent/11 Further Boosts VxWorks Security

By Arlen Baker, Wind River Chief Security Architect Working with the Security Research Community At Wind River, security is embedded in our DNA. It is part of our rich heritage of nearly 40 years in mission-critical systems. It is built into all the technologies we provide to help our customers develop trusted and reliable solutions. We take security extremely seriously,…
Testing Against Cyber-Attacks with Simulation Technology

Testing Against Cyber-Attacks with Simulation Technology

By Michel Genard Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involving USBs brings to light the importance of testing the system against cyber-attacks to eliminate this type of risk. The US Secret Service identified that a supposed foreign agent was using a USB key to upload malware into the IT infrastructure of…
How Does Your Software Security Measure Up?

How Does Your Software Security Measure Up?

By Rick Anderson and Arlen Baker In recent months, Wind River has offered a free software security assessment on our website.The survey is open to anyone and asks ten very brief yes/no security questions about your software system.  Each question focuses on a different aspect of security as spelled out by the Wind River Helix Security Framework.  This framework is built on…
Improving ATM Security

Improving ATM Security

By Rick Anderson While the security of Automated Teller Machines is not necessarily “life critical” as with many other industries (think transportation, medical and some industrial applications), there are certainly financial and identity theft risks associated with these devices.  There is much data on the web regarding the various ATM attack vectors, the estimated number of annual hacks and the cost…
Swarm Technology – Pushing the Barriers of Autonomous Systems

Swarm Technology – Pushing the Barriers of Autonomous Systems

By Andreea Volosincu These are not just any ordinary unmanned aircraft systems (UAS). They fly together. Better still, they swarm together, for any Star Trek fans out there. They can also team up with a manned aircraft and act like a force multiplier. This kind of unmanned aircraft can bring significant improvements to almost every area of national and homeland…
My New Socks from the ARC Industry Forum in Orlando

My New Socks from the ARC Industry Forum in Orlando

By Tony Crupi A few weeks ago, I attended the ARC Industry Forum in Orlando, FL. This was my fourth year attending the conference and it has grown to over 950 attendees, which included attendees from ExxonMobil, Schneider Electric, Rockwell Automation, GE, Honeywell, Intel, and many others. During the event, I was able to meet with many Wind River’s customers, as well…
Is your ATM moving from Windows 7 to Windows 10?  Save the Motherboards!

Is your ATM moving from Windows 7 to Windows 10? Save the Motherboards!

By Rick Anderson Within the financial sector, Automated Teller Machines (ATMs) are one of the primary mechanisms for getting cash out of your bank or savings & loan account.  The majority of these devices are running Microsoft’s Windows 7 operating system on older Intel motherboards.  Unfortunately, Windows 7 end of life occurs on January 14, 2020 and after that date, these ATMs…
Diving Deeper into Multi-core Certification Activities

Diving Deeper into Multi-core Certification Activities

By Paul Parkinson In the recent Wind River and Rockwell Collins joint webinar “Plan with Confidence: Route to a Successful DO-178C Multi-Core Certification”, we discussed a number of topics related to the planning, design, testing and analysis for RTCA DO-178C / EUROCAE ED-12C DAL A safety certification of avionics software systems running on multiple cores on multi-core processors. If you…
Security Response Management: Risk, Cost, and Best Practices in an Imperfect World

Security Response Management: Risk, Cost, and Best Practices in an Imperfect World

By David Reyna Keeping our products secure is a requirement for survival, demanding vigilance in finding, applying, and distributing working patches to our customers in the timeliest manner possible. While there is heightened awareness about device vulnerabilities, what is often missing is awareness about the process of managing the security response process itself. Community security vulnerability data is available, but…
Meeting FDA Regulations to Update Medical Devices for Safety and Security

Meeting FDA Regulations to Update Medical Devices for Safety and Security

By Jeff Kataoka Protecting patients and promoting public health is a key directive for the U.S. Food & Drug Administration (FDA). This directive includes oversight on the safe and secure use of medical devices for patient care. That means that if you are a medical device manufacturer, your company needs to ensure that its medical device is meeting FDA regulations…