Skip to main content
Wind River Wind River
  • Products

    Wind River Platforms »

    • VxWorks
      • VxWorks 7
      • VxWorks Cert
      • VxWorks 653
    • Wind River Cloud Platform
      • Wind River Conductor
      • Wind River Analytics
      • Wind River OpenStack
    • eLxr Pro
    • Helix Virtualization Platform
    • Wind River Linux
    • Zephyr

    Wind River Studio Tools »

    • DEVELOP
      • Workspace
        Streamlines provisioning and configuration of development environments
      • Diab Compiler
      • Pipelines
        Customization and scalability for your DevSecOps pipelines
    • TEST
      • Test Automation
        Framework to automate testing during software development
      • Virtual Lab
        Tool to simulate hardware behaviors when testing software
      • Intel® Simics®
    • MANAGE
      • OTA Updates
        Remote and secure orchestration of multi-device software updates
      • Conductor
        End-to-end automation to orchestrate containers across edge devices
    • MONITOR
      • Digital Feedback Loop
        Platform to conduct analytics on collected edge device data
      • Analytics
        Data pipeline to send edge device data to the cloud
  • Industries

    Industries

    • Industry Col Left
      • Aerospace & Defense
      • Automotive
      • Energy
      • Enterprise
    • Industry Col Right
      • Industrial
      • Medical
      • Startups
      • Telecommunications
    Customer Stories

    Examples of how our solutions have helped customers achieve their goals.

    Start Exploring
  • Insights

    Insights

    • Insights Col Left
      • Articles/Blogs
      • Guides to Intelligent Systems
      • Use Cases
    • Insights Col Right
      • White Papers
      • Web Seminars & Events
    Learning Subscription

    Flexible On-Demand Learning Solutions

    Start Exploring
  • Services

    Wind River Services »

    • CAPABILITIES
      • Design Services
      • Lifecycle Management Services
      • Managed Services
      • Safety & Certification Services
      • Security Services
      • Education Services
    • PACKAGES
      • Wind River Linux Services
      • Wind River Acceleration Program
      • Wind River Zephyr Solutions
    Wind River Learning Subscription

    Choose a single product stream or mix & match bundles for cost-effective learning options!

    Upgrade Your Team’s Skills
  • Security

    Security

    • SECURITY
      • Security Center
      • Linux Security Scanner
      • Secure Development Lifecycle
    • Response
      • PSIRT
      • Vulnerability Responses
      • CVE Database
    Security Center

    Get the latest alerts, CVE updates, and security information.

    Stay Informed
  • Support

    Support

    • SUPPORT
      • Wind River Support Network
      • Product Documentation
    • Learning
      • Wind River Learning
      • Enhanced Support Offerings
    Support Network

    Access documentation, download software, submit request, & more.

    Get Support
  • About

    About Wind River »

    • ABOUT US
      • Newsroom
      • Awards
      • Executive Leadership Team
      • Customer Stories
      • Partners
      • Careers
      • University Program
    • CONTACT US
      • hidden-item
    The Intelligent Systems Future Is Ours to Build Together
Search Search Shop Shop Contact Contact

Wind River Blog

Tag:
Security

173 articles
Back to blog

Improving Embedded Device Security: Securing the Applications

Modern embedded devices are much more than small-scale dedicated systems with a single mode of operation. In fact, embedded systems can host several different functions and...
13 years 7 months ago

How Security and Safety Regulatory Concerns Impact Public Transportation Industry

In my last blog , I discussed the changing mass transit landscape and the shift to commercial-off-the-shelf (COTS) technologies to meet the industry’s changing demands. In addition...
13 years 7 months ago

Improving Embedded Security: Proper Runtime Selection

Selection of secure components for an embedded system is key to a secure system. Leveraging a secure RTOS, middleware, virtualization and tools significantly reduces the effort and...
13 years 7 months ago

Improving Embedded Security: Leverage Advanced Security Design

Trying to address a long list of security requirements for a device on a case-by-case basis is time consuming, costly and frankly not the best way to approach the problem. Two...
13 years 8 months ago

Unmanned Systems: More Reports of Security Vulnerabilities

By now, you’ve likely heard the latest report of security holes in unmanned ground control systems. This time, a key-logging virus has been found on one or more hard drives at the...
13 years 8 months ago

Five Steps to Improving Embedded System Security

Embedded device security needs to be integrated into the development lifecycle of the product rather than being an afterthought. The following are high level guidelines that...
13 years 8 months ago

Medical Devices, Life Savers

There's no doubt, medical devices are saving the most precious elements of nature – people's lives. The World Health Organization's video below highlights the importance of medical...
13 years 8 months ago

Linux, Common Criteria and OS Protection Profiles

In 2011, computer and network security news stories, which were previously the preserve of specialist journals and blogs, have become commonplace in the mainstream media. There are...
13 years 9 months ago

Embedded Virtualization to Underpin Next Generation Network-Centric Operations

“Embedded virtualization” is a technology that is rapidly proliferating in global defense systems that deliver critical data to warfighters. Embedded virtualization is typically...
13 years 9 months ago

The Embedded Security Paradox

For embedded systems developers, there exists a paradox in that security for the device is a high priority or "must-have" capability but it’s at odds with market and business...
13 years 9 months ago

Pagination

  • First page « First
  • Previous page ‹‹
  • …
  • Page 12
  • Current page 13
  • Page 14
  • Page 15
  • …
  • Next page ››
  • Last page Last »

Wind River Blog

The Wind River Blog is made up of a variety of voices: executives, technologists and industry enthusiasts. We hope to foster conversations and encourage the sharing of insights regarding the evolving landscape of intelligent, connected systems with our ecosystem of customers, partners and colleagues.

Get our RSS feed

Subscribe

Enter your email address to receive notifications of new posts.

Popular Tags

Wind RiverVxWorksAerospace & DefenseLinux / Open SourceLinuxNetworkingSoftware EngineeringSecurityOpen SourceSimicsMulti-coreEclipseNFVIoT / M2MTools & SimulationvirtualizationIndustrial

Disclaimer

The postings on this site are the views of the individual poster and do not represent Wind River's positions, strategies or opinions. This site is subject to Wind River’s Terms of Use.

Products

  • Platforms
    • VxWorks
    • eLxr Pro
    • Wind River Cloud Platform
    • Helix Virtualization Platform
    • Wind River Linux
    • Zephyr
  • Studio Tools
    • Workspace
    • Diab Compiler
    • Pipelines
    • Test Automation
    • Virtual Lab
    • Intel® Simics®
    • OTA Updates
    • Conductor
    • Digital Feedback Loop
    • Analytics

Industries

  • Aerospace & Defense
  • Automotive
  • Energy
  • Enterprise
  • Industrial
  • Medical
  • Startups
  • Telecommunications

Security

  • Security Center
  • Vulnerability Responses
  • Linux Security Scanner
  • CVE Database

Explore

  • Resource Library
  • Intelligent Systems Research
  • Web Seminars & Events
  • Wind River Blog
  • Customer Stories
  • Learning Subscription
  • Guides to Intelligent Systems

Support

  • Wind River Support
  • Product Documentation

About

  • About Wind River
  • Newsroom
  • Awards
  • Executive Leadership Team
  • Partners
  • Careers
  • University Program
Support
Contact Us
Compliance at Wind River  | Privacy  | Feedback |
Country
U.S. Japan China

© 2025 Wind River Systems, Inc.
Facebook Twitter Linkedin Youtube