CYBERSECURITY FOR THE INTELLIGENT EDGE
Join Wind River® Principal Security Architect Arlen Baker for a fast-paced look at how to design cybersecurity into can’t-fail devices and systems at the edge.
Cybersecurity Essentials for the Intelligent Edge
In this interactive executive briefing, Wind River will walk you through the tech must-haves to successfully protect your systems and devices through their life cycle.
10 Properties of Secure Embedded Systems
Protecting Can’t-Fail Systems from Tampering, Reverse Engineering, and Other Cyberattacks
The Cybersecurity Journey Through the Full Product Lifecycle
Architecting a secure device starts well before the first line of code is written and ends only when the device is taken out of service. Learn how and where security is applied at different stages...
Capturing Use Case Security Requirements
Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you...
Building a Security Policy
Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk...
Designing with a Trusted Foundation
Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code...
Hardening and Fortifying
You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your...
Ongoing Threat Prevention
Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in...
Putting It All Together
Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device.