White Papers

Software Security Across the Intelligent Edge

Issue link: https://resources.windriver.com/i/1273130

Contents of this Issue


Page 1 of 10

1 Three Dynamics Impacting Security HOW DID EMERSON MAKE ITS OVATION DCS MORE CONNECTED AND MORE SECURE? With machine learning, full-system simulation, and Wind River. The Ovation TM distributed control system (DCS) platform evolves with changing technology to enhance power plant reliability and has been designated a Qualified Anti-terrorism Technology by the Department of Homeland Security (DHS) under the U.S. SAFETY Act. Emerson uses Wind River ® solutions for the entire Ovation lifecycle: accelerating development with virtual hardware, running VxWorks ® as the underlying OS for the DCS, simulating the entire physical environment of the plant, and — critically for operational security — modeling control system operation. These lifecycle solutions provide a baseline for system parameters and performance that can help identify anomalous behaviors before they impact production systems. Two billion PCs and 42 billion connected Internet of Things devices will be part of our world by 2025. Nearly every device will work through the cloud in some way, and 80% of the data we all create, consume, and are part of will go through the 5G cloud.However, currently a mere 11.5% of all corporations are digitally transforming successfully, 1 which means that a majority of organizations still face huge challenges to their ability to thrive in the coming digital-centered world. Security is foremost among those challenges. Imagine the complexities of designing security protocols in this new and evolving world. More than half of technology leaders see multiple security concerns directly connected to digital transformation initiatives, including increased cybersecurity risks (53%), cybercriminal sophistication (56%), and increased threat surface (53%). These threats are compounded by another concern shared by 40% of CISOs, CTOs, and CIOs: namely, the problems caused by rigid technology infrastructure — the sort of infra- structure tightly associated with embedded systems. 2 Consider three dynamics that are changing constantly around us, de- tailed in the following pages. 1 Forbes/Inc.Digital 2 media.nominet.uk/wp-content/uploads/2019/07/Cyber-Securi -in-the-Age-of-Digital-Transforma     tion.pdf 40% of CISOs, CTOs, and CIOs are concerned about the problems caused by rigid technology infrastructure — the sort of infrastructure tightly associated with embedded systems.

Articles in this issue

Links on this page

view archives of White Papers - Software Security Across the Intelligent Edge