Skip to main content
Wind River Wind River
  • Products

    Embedded Platforms »

    • Real-Time Operating System
      VxWorks

      Safety certified RTOS with deterministic performance and reliability for mission-critical embedded systems.

    • Commercial Linux for Embedded Systems
      Wind River Linux

      Yocto Project embedded Linux subscription with security vulnerability monitoring, long term maintenance and support.

    • Mixed-Criticality Hypervisor
      Helix Virtualization Platform

      Embedded virtualization platform that allows multiple operating systems, such as VxWorks, Linux and Android, to run simultaneously on a single SoC.

    Enterprise Platforms »

    • Commercial Linux for Edge Systems
      eLxr Pro

      Debian-based enterprise Linux distribution for edge computing with long-term maintenance and support.

    • Private Cloud Platform
      Wind River Cloud Platform

      High availability, cost-effective, open source, cloud infrastructure for virtualized and containerized workloads.

    Studio Tools »

    • Develop
      WorkspacesDiab CompilerPipeline Manager

      Create, build and integrate software for embedded and edge systems, with standardized environments and process automation.

    • Test
      Virtual LabTest AutomationInteI®Simics®

      Automate and accelerate software testing, quality, and time to market using simulated and physical environments.

    • Manage
      OTA UpdatesConductor

      Automate, deploy, orchestrate and update software for embedded devices, edge systems, and cloud infrastructure

    • Monitor
      Digital Feedback LoopAnalytics

      Analyze data across networks of distributed devices and servers to gain cross-domain visibility and actionable insights.

  • Industries

    Industries

    • Industry Col Left
      • Aerospace & Defense
      • Automotive
      • Energy
      • Enterprise
    • Industry Col Right
      • Industrial
      • Medical
      • Telecommunications
      • Retail
    Customer Stories

    Examples of how our solutions have helped customers achieve their goals.

    Start Exploring
  • Insights

    Insights »

    • Topics
      • 5G
      • AI
      • DevOps
      • Intelligent Edge
      • Security
    • Content Types
      • White Papers
      • Videos
      • Use Cases
      • Inside Edge: Industry Primers
      • Articles/Blogs
      • Seminars & Events
  • Services

    Wind River Services »

    • CAPABILITIES
      • Design Services
      • Lifecycle Management Services
      • Managed Services
      • Safety & Certification Services
      • Security Services
      • Education Services
    • PACKAGES
      • Wind River Linux Services
      • Wind River Acceleration Program
      • Wind River Zephyr Solutions
    Wind River Learning Subscription

    Choose a single product stream or mix & match bundles for cost-effective learning options!

    Upgrade Your Team’s Skills
  • Security

    Security

    • SECURITY
      • Security Center
      • Linux Security Scanner
      • Secure Development Lifecycle
    • Response
      • PSIRT
      • Vulnerability Responses
      • CVE Database
    Security Center

    Get the latest alerts, CVE updates, and security information.

    Stay Informed
  • Support

    Support

    • SUPPORT
      • Wind River Support Network
      • Product Documentation
    • Learning
      • Wind River Learning
      • Enhanced Support Offerings
    Support Network

    Access documentation, download software, submit request, & more.

    Get Support
  • About

    About Wind River »

    • ABOUT US
      • Newsroom
      • Awards
      • Executive Leadership Team
      • Customer Stories
      • Partners
      • Careers
      • University Program
    • CONTACT US
      • hidden-item
    The Intelligent Systems Future Is Ours to Build Together
Shop icon Shop Contact icon Contact

Wind River Blog

Tag:
Security

53 articles
Back to blog
Free Linux Security Vulnerability Scanning from the Industry Leader

Free Linux Security Vulnerability Scanning from the Industry Leader

As a founding member and the foremost commercial software contributor to the Yocto Project, we are setting new standards for excellence in Linux implementation within the embedded...
2 years 5 months ago
5 Best Practices for Securing Linux Devices at the Edge

5 Best Practices for Securing Linux Devices at the Edge

The Internet of Things. It sounds innocuous enough. After all, how much damage can one little thing cause? But if they called it The Internet of Unsecured Devices with Easy Access...
2 years 5 months ago
Delivering Collaborative Solutions for Embedded Avionics, Automotive, Industrial, Medical, Robotics, and More: A Long and Successful History

Delivering Collaborative Solutions for Embedded Avionics, Automotive, Industrial, Medical, Robotics, and More: A Long and Successful History

With more than 40 years of experience, Wind River has built an unmatched reputation for delivering runtime software that has been integrated with the most popular hardware...
2 years 5 months ago
7 Building Blocks for CVE Prioritization

7 Building Blocks for CVE Prioritization

Welcome to part two of our three-part series on bringing a structured approach to securing embedded Linux devices. The previous post outlined key questions you can ask to fully...
2 years 5 months ago
6 Essential Questions for Evaluating the Threat Landscape of Your Embedded Linux Devices

6 Essential Questions for Evaluating the Threat Landscape of Your Embedded Linux Devices

The real question is how to get a realistic, accurate understanding of your threat landscape, so you can transform chaotic or haphazard security measures into structured, cost...
2 years 5 months ago
How to Improve Cybersecurity Using Simulation

How to Improve Cybersecurity Using Simulation

System simulation isn’t necessarily new. The technology has been around and is well tested, even if many systems developers still are dragging their feet to adopt. Improving...
2 years 6 months ago
NIST SSDF Compliance Doesn’t Have to Be a Deal-Breaker

NIST SSDF Compliance Doesn’t Have to Be a Deal-Breaker

Win more government projects by leveraging Wind River Security Assessment services. It’s hard enough to keep track of the acronyms, let alone the actual compliance requirements...
2 years 7 months ago
Leveraging Today’s Technology for Secure Avionics Software Development

Leveraging Today’s Technology for Secure Avionics Software Development

New technologies and ways of collaborating are shaping the ways software businesses build embedded systems for the avionics industry. Given new and high-impact opportunities in...
2 years 8 months ago
Testing Against Cyber-Attacks with Simulation Technology

Testing Against Cyber-Attacks with Simulation Technology

Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involving USBs brings to light the importance of testing the system against cyber...
6 years 5 months ago
How Does Your Software Security Measure Up?

How Does Your Software Security Measure Up?

In recent months, Wind River has offered a free software security assessment on our website.The survey is open to anyone and asks ten very brief yes/no security questions about...
6 years 6 months ago

Pagination

  • Current page 1
  • Page 2
  • Page 3
  • Page 4
  • …
  • Next page ››
  • Last page Last »

Wind River Blog

The Wind River Blog is made up of a variety of voices: executives, technologists and industry enthusiasts. We hope to foster conversations and encourage the sharing of insights regarding the evolving landscape of intelligent, connected systems with our ecosystem of customers, partners and colleagues.

Get our RSS feed

Subscribe

Enter your email address to receive notifications of new posts.

Popular Tags

Wind RiverVxWorksNetworkingLinux / Open SourceNFVAerospace & DefenseIndustrialIoT / M2MLinuxOpen SourceSecurityInternet of ThingsSimicsAutomotiveTelecomTools & SimulationAerospace and Defense

Disclaimer

The postings on this site are the views of the individual poster and do not represent Wind River's positions, strategies or opinions. This site is subject to Wind River’s Terms of Use.

Products

  • Platforms
    • VxWorks
    • eLxr Pro
    • Wind River Cloud Platform
    • Helix Virtualization Platform
    • Wind River Linux
    • Zephyr
  • Studio Tools
    • Workspace
    • Diab Compiler
    • Pipeline Manager
    • Test Automation
    • Virtual Lab
    • Intel® Simics®
    • OTA Updates
    • Conductor
    • Digital Feedback Loop
    • Analytics

Industries

  • Aerospace & Defense
  • Automotive
  • Energy
  • Enterprise
  • Industrial
  • Medical
  • Startups
  • Telecommunications

Security

  • Security Center
  • Vulnerability Responses
  • Linux Security Scanner
  • CVE Database

Explore

  • Resource Library
  • Intelligent Systems Research
  • Web Seminars & Events
  • Wind River Blog
  • Customer Stories
  • Learning Subscription
  • Guides to Intelligent Systems

Support

  • Wind River Support
  • Product Documentation

About

  • About Wind River
  • Newsroom
  • Awards
  • Executive Leadership Team
  • Partners
  • Careers
  • University Program
Support
Contact Us
Compliance at Wind River  | Privacy  | Feedback |
Country
U.S. Japan China

© 2025 Wind River Systems, Inc.
Facebook Twitter Linkedin Youtube