Cybersecurity Resources

Wind River delivers the security technologies and expertise to help companies combat new cyberthreats emerging from the IoT era. Wind River is committed to active threat monitoring, rapid assessment, proactive customer notification, and timely fixes. Explore useful resources to help you navigate an evolving threat landscape.

  • Cybersecurity Essentials for the Intelligent Edge

    Cybersecurity Essentials for the Intelligent Edge

    ​In this interactive executive briefing, Wind River will walk you through the tech must-haves to successfully protect your systems and devices through their life cycle.

    Explore
  • 10 Properties of Secure Intelligent Edge Systems

    10 Properties of Secure Intelligent Edge Systems

    Protecting Can’t-Fail Systems from Tampering, Reverse Engineering, and Other Cyberattacks

    Explore
  • IS YOUR DATA IN THE CLEAR THROUGHOUT THE EDGE?

    IS YOUR DATA IN THE CLEAR THROUGHOUT THE EDGE?

    98% OF ALL IOT DEVICE TRAFFIC IS LEFT UNENCRYPTED. The data revolution underway in devices is accompanied by the struggle to secure that data. And because the unencrypted traffic includes data from...

    Explore
  • How can Wind River help you optimize the security of your systems and devices?

    TALK TO EXPERT
  • DO YOU HAVE A COMPREHENSIVE SECURITY STRATEGY?

    DO YOU HAVE A COMPREHENSIVE SECURITY STRATEGY?

    THE WORLD IS DIGITALLY TRANSFORMING. There is no single silver-bullet solution for protecting a system from all possible attacks. You need a layered approach that delivers a multifaceted shield...

    Explore
  • DOES YOUR ORGANIZATION HAVE THE SKILLS NECESSARY TO KEEP YOUR PRODUCTS SECURE?

    DOES YOUR ORGANIZATION HAVE THE SKILLS NECESSARY TO KEEP YOUR PRODUCTS SECURE?

    PROGRAMMING ERRORS ARE A LEADING CAUSE OF VULNERABILITIES. It’s a new digital world, but experience still matters. A number of new dynamics are leading to a shortage of qualified candidates for...

    Explore
  • Software Security Across the Intelligent Edge

    Software Security Across the Intelligent Edge

    SECURITY MUST COVER EVERY SINGLE ENDPOINT DEVICE, THROUGH THE ENTIRE LIFECYCLE

    Explore
  • Making the Grade with Cybersecurity, Linux, and the Intelligent Edge1:03:15

    Making the Grade with Cybersecurity, Linux, and the Intelligent Edge

    Making the grade in any industry requires having an open source solution that meets the specific requirements of the various device, machine, and system implementations that service that industry.

    WATCH
  • Secure the Future, ep. 1: State-of-the-Art Security2:01

    Secure the Future, ep. 1: State-of-the-Art Security

    Wind River Chief Systems Architect Matt Jones discusses the importance of state-of-the-art security.

    WATCH
  • Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Systems

    Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Systems

    Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense requirements by protecting classified and/or sensitive data at rest, delivering secure embedded...

    Explore
  • Test Early and Test Often: A How-To Guide for Cybersecurity

    Test Early and Test Often: A How-To Guide for Cybersecurity

    Threats to cyber systems are continually evolving, so your test environment also needs to evolve. Testing on your production system is not only risky, but may not be possible if it isn’t built yet.

    Explore
  • Cybersecurity and Secure Deployments

    Cybersecurity and Secure Deployments

    Learn why creating and testing security solutions is more effectively performed using virtual hardware and system simulation technology, rather than using the live systems that are subject to attacks.

    Explore
  • Exposing Cybersecurity Threats with Wind River Simics1:02

    Exposing Cybersecurity Threats with Wind River Simics

    Cybersecurity testing is a growing importance for many organizations. How do you ensure that your testing is robust and repeatable? Learn how Wind River Simics enables you to test security...

    WATCH
  • Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing

    Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing

    A primer on getting ahead of cybersecurity problems through vulnerability testing...

    Explore
  • ReFirm Labs Announces New Strategic Technology Collaboration for IoT Security with Wind River

    ReFirm Labs Announces New Strategic Technology Collaboration for IoT Security with Wind River

    The new collaboration will accelerate the development and integration of ReFirm Labs’ Centrifuge Platform® for IoT security with VxWorks®, the most widely-deployed real-time operating system (RTOS)...

    Explore
  • Testing Against Cyber-Attacks with Simulation Technology

    Testing Against Cyber-Attacks with Simulation Technology

    Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involving USBs brings to light the importance of testing the system against...

    Explore
  • Professional Services Security Review for VxWorks 7 Datasheet

    Professional Services Security Review for VxWorks 7 Datasheet

    Enabling Secure Deployment of Devices with VxWorks 7

    Explore
  • Securing the Edge with StarlingX

    Securing the Edge with StarlingX

    Security on the edge is crucial. Learn more about how the StarlingX 2.0 release helps addressing this challenge.As we drive compute to the edge of the network many things change and...

    Explore
  • Security Overview: Conquering Security in the IoT Era

    Security Overview: Conquering Security in the IoT Era

    Explore
  • Karamba Security Expands its Autonomous Cybersecurity Technology to Protect Enterprise Edge, Industry 4.0 and IoT Smart Devices

    Karamba Security Expands its Autonomous Cybersecurity Technology to Protect Enterprise Edge, Industry 4.0 and IoT Smart Devices

    Karamba Security, a world-leading provider of embedded cybersecurity for the automotive industry, today announced that its autonomous security solution is being used to protect connected devices...

    Explore
  • Cybersecurity for Medical Devices in a Connected Healthcare System

    Cybersecurity for Medical Devices in a Connected Healthcare System

    Explore
  • loading
    Loading More...