Cybersecurity Resources

Wind River delivers the security technologies and expertise to help companies combat new cyberthreats emerging from the IoT era. Wind River is committed to active threat monitoring, rapid assessment, proactive customer notification, and timely fixes. Explore useful resources to help you navigate an evolving threat landscape.

  • Supporting Hardware Security Through Software

    Supporting Hardware Security Through Software

    This paper provides an overview of the different levels of attack on hardware devices, then reviews the various ways of using software to protect these devices.

    Explore
  • Preventing Zero-Day Attacks and Mitigating CVEs with Linux Hardening Tools

    Preventing Zero-Day Attacks and Mitigating CVEs with Linux Hardening Tools

    There is no silver bullet for addressing and mitigating CVEs in software and systems. However, tools such as Titanium Linux, an operating system hardening product within Titanium Security Suite...

    Explore
  • Professional Services Security Assessment Datasheet

    Professional Services Security Assessment Datasheet

    The approaches to security are varied and confusing — and dynamic, due to the ever-changing threat landscape and increasing regulatory requirements. Wind River® Professional Services has...

    Explore
  • How can Wind River help you optimize the security of your systems and devices?

    TALK TO EXPERT
  • Cybersecurity Essentials for the Intelligent Edge

    Cybersecurity Essentials for the Intelligent Edge

    ​In this interactive executive briefing, Wind River will walk you through the tech must-haves to successfully protect your systems and devices through their life cycle.

    Explore
  • 10 Properties of Secure Embedded Systems

    10 Properties of Secure Embedded Systems

    Protecting Can’t-Fail Systems from Tampering, Reverse Engineering, and Other Cyberattacks

    Explore
  • IS YOUR DATA IN THE CLEAR THROUGHOUT THE EDGE?

    IS YOUR DATA IN THE CLEAR THROUGHOUT THE EDGE?

    98% OF ALL IOT DEVICE TRAFFIC IS LEFT UNENCRYPTED. The data revolution underway in devices is accompanied by the struggle to secure that data. And because the unencrypted traffic includes data from...

    Explore
  • DO YOU HAVE A COMPREHENSIVE SECURITY STRATEGY?

    DO YOU HAVE A COMPREHENSIVE SECURITY STRATEGY?

    THE WORLD IS DIGITALLY TRANSFORMING. There is no single silver-bullet solution for protecting a system from all possible attacks. You need a layered approach that delivers a multifaceted shield...

    Explore
  • DOES YOUR ORGANIZATION HAVE THE SKILLS NECESSARY TO KEEP YOUR PRODUCTS SECURE?

    DOES YOUR ORGANIZATION HAVE THE SKILLS NECESSARY TO KEEP YOUR PRODUCTS SECURE?

    PROGRAMMING ERRORS ARE A LEADING CAUSE OF VULNERABILITIES. It’s a new digital world, but experience still matters. A number of new dynamics are leading to a shortage of qualified candidates for...

    Explore
  • Software Security Across the Intelligent Edge

    Software Security Across the Intelligent Edge

    Security Must Cover Every Single Endpoint Device, Through the Entire Lifecycle

    Explore
  • Making the Grade with Cybersecurity, Linux, and the Intelligent Edge1:03:15

    Making the Grade with Cybersecurity, Linux, and the Intelligent Edge

    Making the grade in any industry requires having an open source solution that meets the specific requirements of the various device, machine, and system implementations that service that industry.

    WATCH
  • Secure the Future, ep. 1: State-of-the-Art Security2:01

    Secure the Future, ep. 1: State-of-the-Art Security

    Wind River Chief Systems Architect Matt Jones discusses the importance of state-of-the-art security.

    WATCH
  • Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Systems

    Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Systems

    Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense requirements by protecting classified and/or sensitive data at rest, delivering secure embedded...

    Explore
  • Test Early and Test Often: A How-To Guide for Cybersecurity

    Test Early and Test Often: A How-To Guide for Cybersecurity

    Threats to cyber systems are continually evolving, so your test environment also needs to evolve. Testing on your production system is not only risky, but may not be possible if it isn’t built yet.

    Explore
  • Cybersecurity and Secure Deployments

    Cybersecurity and Secure Deployments

    Learn why creating and testing security solutions is more effectively performed using virtual hardware and system simulation technology, rather than using the live systems that are subject to attacks.

    Explore
  • Exposing Cybersecurity Threats with Wind River Simics1:02

    Exposing Cybersecurity Threats with Wind River Simics

    Cybersecurity testing is a growing importance for many organizations. How do you ensure that your testing is robust and repeatable? Learn how Wind River Simics enables you to test security...

    WATCH
  • Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing

    Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing

    A primer on getting ahead of cybersecurity problems through vulnerability testing...

    Explore
  • Testing Against Cyber-Attacks with Simulation Technology

    Testing Against Cyber-Attacks with Simulation Technology

    Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involving USBs brings to light the importance of testing the system against...

    Explore
  • Securing the Edge with StarlingX

    Securing the Edge with StarlingX

    Security on the edge is crucial. Learn more about how the StarlingX 2.0 release helps addressing this challenge.As we drive compute to the edge of the network many things change and...

    Explore
  • Security Overview: Conquering Security in the IoT Era

    Security Overview: Conquering Security in the IoT Era

    Explore
  • Karamba Security Expands its Autonomous Cybersecurity Technology to Protect Enterprise Edge, Industry 4.0 and IoT Smart Devices

    Karamba Security Expands its Autonomous Cybersecurity Technology to Protect Enterprise Edge, Industry 4.0 and IoT Smart Devices

    Karamba Security, a world-leading provider of embedded cybersecurity for the automotive industry, today announced that its autonomous security solution is being used to protect connected devices...

    Explore
  • loading
    Loading More...