Security | Wind River Skip to main content
Wind River Wind River
  • Products

    Wind River Edge

    VxWorks
    The industry's most widely deployed real-time operating system
    Wind River Linux
    The leading commercial embedded Linux operating system
    Wind River Helix Virtualization Platform
    A safety certifiable, multi-OS hypervisor that supports mixed levels of criticality

    Wind River Studio »

    Wind River Studio is the first cloud-native platform for the development, deployment, operations, and servicing of mission-critical intelligent edge systems.

    • DEVELOPER
      • Pipelines
        Customization and scalability for your DevSecOps pipelines
      • Virtual Lab
        Tool to simulate hardware behaviors when testing software
      • Test Automation
        Framework to automate testing during software development
      • Over-the-Air Updates
        Remote and secure orchestration of multi-device software updates
      • Digital Feedback Loop
        Platform to conduct analytics on collected edge device data
    • OPERATOR
      • Cloud Platform
        Integrated platform for deployment and management of edge software
      • Conductor
        End-to-end automation to orchestrate containers across edge devices
      • Analytics
        Data pipeline to send edge device data to the cloud
    • VxWorks Purchase the world's leading RTOS. Buy Now
    • Industry-Leading Compiler Optimize your code with Wind River Diab Compiler. Buy Now
    • Security Scanner Scan your Linux system for security vulnerabilities. Scan Now
    • Find a BSP Browse hundreds of board support packages. Find a BSP
  • Industries & Insights

    Industries & Insights

    • INDUSTRIES
      • Aerospace & Defense
      • Automotive
      • Energy
      • Industrial
      • Medical
      • Startups
      • Telecommunications
    • LEARN & EXPLORE
      • Resource Library
      • Intelligent Systems Research
      • Web Seminars & Events
      • Wind River Blog
      • Customer Stories
      • Learning Subscription
      • Guides to Intelligent Systems
    Resource Library

    Browse through white papers, videos, infographics, and more.

    Start Exploring
  • Services

    Wind River Studio Services »

    • CAPABILITIES
      • Design Services
      • Lifecycle Management Services
      • Managed Services
      • Safety & Certification Services
      • Security Services
      • Education Services
    • PACKAGES
      • Wind River Studio Linux Services
      • Wind River Learning Subscription
    Wind River Acceleration Program

    Expedite your success with support and training.

    Acceleration Your Business
  • Security & Support

    Security & Support

    • SECURITY
      • Security Center
      • Linux Security Scanner
      • PSIRT
      • Vulnerability Responses
      • CVE Database
    • SUPPORT
      • Wind River Support Network
      • Product Documentation
      • Wind River Learning
      • Enhanced Support Offerings
    Security Center

    Get the latest alerts, CVE updates, and security information.

    Stay Informed
    Support Network

    Access documentation, download software, submit request, & more.

    Get Support
  • About

    About Wind River »

    • ABOUT US
      • Newsroom
      • Awards
      • Executive Leadership Team
      • Customer Stories
      • Partners
      • Diversity & Inclusion
      • Careers
      • University Program
    • CONTACT US
      • hidden-item
    The Intelligent Systems Future Is Ours to Build Together
Search Search Shop Shop Contact Contact
Clear
Search Loading

Wind River Blog

Tag:
Security

173 articles
Back to blog
Free Linux Security Vulnerability Scanning from the Industry Leader

Free Linux Security Vulnerability Scanning from the Industry Leader

As a founding member and the foremost commercial software contributor to the Yocto Project, we are setting new standards for excellence in Linux implementation within the embedded...
3 months 3 weeks ago
5 Best Practices for Securing Linux Devices at the Edge

5 Best Practices for Securing Linux Devices at the Edge

The Internet of Things . It sounds innocuous enough. After all, how much damage can one little thing cause? But if they called it The Internet of Unsecured Devices with Easy Access...
3 months 3 weeks ago
Delivering Collaborative Solutions for Embedded Avionics, Automotive, Industrial, Medical, Robotics, and More: A Long and Successful History

Delivering Collaborative Solutions for Embedded Avionics, Automotive, Industrial, Medical, Robotics, and More: A Long and Successful History

With more than 40 years of experience, Wind River has built an unmatched reputation for delivering runtime software that has been integrated with the most popular hardware...
3 months 3 weeks ago
7 Building Blocks for CVE Prioritization

7 Building Blocks for CVE Prioritization

Welcome to part two of our three-part series on bringing a structured approach to securing embedded Linux devices. The previous post outlined key questions you can ask to fully...
4 months 2 weeks ago
6 Essential Questions for Evaluating the Threat Landscape of Your Embedded Linux Devices

6 Essential Questions for Evaluating the Threat Landscape of Your Embedded Linux Devices

The real question is how to get a realistic, accurate understanding of your threat landscape, so you can transform chaotic or haphazard security measures into structured, cost...
4 months 2 weeks ago
How to Improve Cybersecurity Using Simulation

How to Improve Cybersecurity Using Simulation

System simulation isn’t necessarily new. The technology has been around and is well tested, even if many systems developers still are dragging their feet to adopt. Improving...
5 months 1 week ago
NIST SSDF Compliance Doesn’t Have to Be a Deal-Breaker

NIST SSDF Compliance Doesn’t Have to Be a Deal-Breaker

Win more government projects by leveraging Wind River Security Assessment services. It’s hard enough to keep track of the acronyms, let alone the actual compliance requirements...
6 months ago
Leveraging Today’s Technology for Secure Avionics Software Development

Leveraging Today’s Technology for Secure Avionics Software Development

New technologies and ways of collaborating are shaping the ways software businesses build embedded systems for the avionics industry. Given new and high-impact opportunities in...
6 months 3 weeks ago
Testing Against Cyber-Attacks with Simulation Technology

Testing Against Cyber-Attacks with Simulation Technology

Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involving USBs brings to light the importance of testing the system against cyber...
4 years 4 months ago
How Does Your Software Security Measure Up?

How Does Your Software Security Measure Up?

In recent months, Wind River has offered a free software security assessment on our website.The survey is open to anyone and asks ten very brief yes/no security questions about...
4 years 5 months ago

Pagination

  • Current page 1
  • Page 2
  • Page 3
  • Page 4
  • …
  • Next page ››
  • Last page Last »

Wind River Blog

The Wind River Blog is made up of a variety of voices: executives, technologists and industry enthusiasts. We hope to foster conversations and encourage the sharing of insights regarding the evolving landscape of intelligent, connected systems with our ecosystem of customers, partners and colleagues.

Get our RSS feed

Subscribe

Enter your email address to receive notifications of new posts.

Popular Tags

Wind RiverVxWorksAerospace & DefenseLinux / Open SourceLinuxNetworkingSoftware EngineeringSecurityOpen SourceSimicsEclipseMulti-coreNFVIoT / M2MTools & SimulationvirtualizationInternet of Things

Disclaimer

The postings on this site are the views of the individual poster and do not represent Wind River's positions, strategies or opinions. This site is subject to Wind River’s Terms of Use.

Products

  • VxWorks
  • Wind River Linux
  • Wind River Helix Virtualization Platform
  • Wind River Studio
  • Wind River Studio Operator
  • Wind River Diab Compiler
  • Board Support Packages

Services

  • Wind River Support Network
  • Product Documentation

Industries

  • Aerospace & Defense
  • Automotive
  • Energy
  • Industrial
  • Medical
  • Startups
  • Telecommunications

Security

  • Security Center
  • Vulnerability Responses
  • Linux Security Scanner
  • CVE Database

Explore

  • Resource Library
  • Intelligent Systems Research
  • Web Seminars & Events
  • Wind River Blog
  • Customer Stories
  • Learning Subscription
  • Guides to Intelligent Systems

Support

  • Wind River Support Network
  • Product Documentation

About

  • About Wind River
  • Newsroom
  • Awards
  • Executive Leadership Team
  • Partners
  • Diversity & Inclusion
  • Careers
  • University Program
Support
Contact Us
Compliance at Wind River  | Privacy  | Feedback |
Country
U.S. Japan China

© 2023 Wind River Systems, Inc.
Facebook Twitter Linkedin Youtube