Wind River® Professional Services guides our customers in securing their IoT devices and systems that are based on Wind River world-class operating systems. Our team is highly experienced and successful in the security field that spans critical infrastructure market segments including aerospace, defense, medical, industrial, networking, and transportation.
Have you explored our dedicated security center?EXPLORE NOW
You may also be interested in:
Test Early and Test Often: A How-To Guide for Cybersecurity
Threats to cyber systems are continually evolving, so your test environment also needs to evolve. Testing on your production system is not only risky, but may not be possible if it isn’t built yet.
Cybersecurity and Secure Deployments
Learn why creating and testing security solutions is more effectively performed using virtual hardware and system simulation technology, rather than using the live systems that are subject to attacks.
Exposing Cybersecurity Threats with Wind River Simics
Cybersecurity testing is a growing importance for many organizations. How do you ensure that your testing is robust and repeatable? Learn how Wind River Simics enables you to test security...
Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing
A primer on getting ahead of cybersecurity problems through vulnerability testing...
Secure the Future
Security is embedded in our DNA at Wind River®. It is part of our rich heritage of more than 30 years in mission-critical systems in markets such as aerospace and defense. It is built into all the...
ReFirm Labs Announces New Strategic Technology Collaboration for IoT Security with Wind River
The new collaboration will accelerate the development and integration of ReFirm Labs’ Centrifuge Platform® for IoT security with VxWorks®, the most widely-deployed real-time operating system (RTOS)...
Testing Against Cyber-Attacks with Simulation Technology
Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involving USBs brings to light the importance of testing the system against...
Professional Services Security Review for VxWorks 7 Datasheet
Enabling Secure Deployment of Devices with VxWorks 7
Securing the Edge with StarlingX
Security on the edge is crucial. Learn more about how the StarlingX 2.0 release helps addressing this challenge.As we drive compute to the edge of the network many things change and...
Security Overview: Conquering Security in the IoT Era
Karamba Security Expands its Autonomous Cybersecurity Technology to Protect Enterprise Edge, Industry 4.0 and IoT Smart Devices
Karamba Security, a world-leading provider of embedded cybersecurity for the automotive industry, today announced that its autonomous security solution is being used to protect connected devices...
Security Response Management: Risk, Cost, and Best Practices in an Imperfect World
Keeping our products secure is a requirement for survival, demanding vigilance in finding, applying, and distributing working patches to our customers in the timeliest manner...
Cybersecurity for Medical Devices in a Connected Healthcare System
Cybersecurity: The Importance of Protecting Data at Rest with VxWorks
By Ka Kay Achacoso A few months ago, Equifax had a data breach that exposed to hackers the names, social security numbers, credit card numbers, driver’s license numbers, and other sensitive...
Tackling IoT Security with New Wind River Services Offering
By Amit Ronen Security is the number one issue facing IoT deployments and must be properly addressed before broad adoption can begin. Cybersecurity has become a high priority for IT systems, yet...
What's lurking in your code?
More Connected Devices = More Data = More Risk
VxWorks Tour Part 2 – VxWorks Security Overview