Security | Wind River Skip to main content
Wind River Wind River
  • Products

    Wind River Platforms »

    • VxWorks
      • VxWorks 7
      • VxWorks Cert
      • VxWorks 653
    • Wind River Cloud Platform
      • Wind River Conductor
      • Wind River Analytics
      • Wind River OpenStack
    • eLxr Pro
    • Helix Virtualization Platform
    • Wind River Linux
    • Zephyr

    Wind River Studio Tools »

    • DEVELOP
      • Workspace
        Streamlines provisioning and configuration of development environments
      • Diab Compiler
      • Pipelines
        Customization and scalability for your DevSecOps pipelines
    • TEST
      • Test Automation
        Framework to automate testing during software development
      • Virtual Lab
        Tool to simulate hardware behaviors when testing software
      • Intel® Simics®
    • MANAGE
      • OTA Updates
        Remote and secure orchestration of multi-device software updates
      • Conductor
        End-to-end automation to orchestrate containers across edge devices
    • MONITOR
      • Digital Feedback Loop
        Platform to conduct analytics on collected edge device data
      • Analytics
        Data pipeline to send edge device data to the cloud
  • Industries

    Industries

    • Industry Col Left
      • Aerospace & Defense
      • Automotive
      • Energy
      • Enterprise
    • Industry Col Right
      • Industrial
      • Medical
      • Startups
      • Telecommunications
    Customer Stories

    Examples of how our solutions have helped customers achieve their goals.

    Start Exploring
  • Insights

    Insights

    • Insights Col Left
      • Articles/Blogs
      • Guides to Intelligent Systems
      • Use Cases
    • Insights Col Right
      • White Papers
      • Web Seminars & Events
    Learning Subscription

    Flexible On-Demand Learning Solutions

    Start Exploring
  • Services

    Wind River Services »

    • CAPABILITIES
      • Design Services
      • Lifecycle Management Services
      • Managed Services
      • Safety & Certification Services
      • Security Services
      • Education Services
    • PACKAGES
      • Wind River Linux Services
      • Wind River Acceleration Program
      • Wind River Zephyr Solutions
    Wind River Learning Subscription

    Choose a single product stream or mix & match bundles for cost-effective learning options!

    Upgrade Your Team’s Skills
  • Security

    Security

    • SECURITY
      • Security Center
      • Linux Security Scanner
      • Star Lab Kevlar Embedded Security
    • Response
      • PSIRT
      • Vulnerability Responses
      • CVE Database
    Security Center

    Get the latest alerts, CVE updates, and security information.

    Stay Informed
  • Support

    Support

    • SUPPORT
      • Wind River Support Network
      • Product Documentation
    • Learning
      • Wind River Learning
      • Enhanced Support Offerings
    Support Network

    Access documentation, download software, submit request, & more.

    Get Support
  • About

    About Wind River »

    • ABOUT US
      • Newsroom
      • Awards
      • Executive Leadership Team
      • Customer Stories
      • Partners
      • Careers
      • University Program
    • CONTACT US
      • hidden-item
    The Intelligent Systems Future Is Ours to Build Together
Search Search Shop Shop Contact Contact

Wind River Blog

Tag:
Security

173 articles
Back to blog
Free Linux Security Vulnerability Scanning from the Industry Leader

Free Linux Security Vulnerability Scanning from the Industry Leader

As a founding member and the foremost commercial software contributor to the Yocto Project, we are setting new standards for excellence in Linux implementation within the embedded...
1 year 11 months ago
5 Best Practices for Securing Linux Devices at the Edge

5 Best Practices for Securing Linux Devices at the Edge

The Internet of Things . It sounds innocuous enough. After all, how much damage can one little thing cause? But if they called it The Internet of Unsecured Devices with Easy Access...
1 year 11 months ago
Delivering Collaborative Solutions for Embedded Avionics, Automotive, Industrial, Medical, Robotics, and More: A Long and Successful History

Delivering Collaborative Solutions for Embedded Avionics, Automotive, Industrial, Medical, Robotics, and More: A Long and Successful History

With more than 40 years of experience, Wind River has built an unmatched reputation for delivering runtime software that has been integrated with the most popular hardware...
1 year 11 months ago
7 Building Blocks for CVE Prioritization

7 Building Blocks for CVE Prioritization

Welcome to part two of our three-part series on bringing a structured approach to securing embedded Linux devices. The previous post outlined key questions you can ask to fully...
1 year 11 months ago
6 Essential Questions for Evaluating the Threat Landscape of Your Embedded Linux Devices

6 Essential Questions for Evaluating the Threat Landscape of Your Embedded Linux Devices

The real question is how to get a realistic, accurate understanding of your threat landscape, so you can transform chaotic or haphazard security measures into structured, cost...
1 year 11 months ago
How to Improve Cybersecurity Using Simulation

How to Improve Cybersecurity Using Simulation

System simulation isn’t necessarily new. The technology has been around and is well tested, even if many systems developers still are dragging their feet to adopt. Improving...
2 years ago
NIST SSDF Compliance Doesn’t Have to Be a Deal-Breaker

NIST SSDF Compliance Doesn’t Have to Be a Deal-Breaker

Win more government projects by leveraging Wind River Security Assessment services. It’s hard enough to keep track of the acronyms, let alone the actual compliance requirements...
2 years 1 month ago
Leveraging Today’s Technology for Secure Avionics Software Development

Leveraging Today’s Technology for Secure Avionics Software Development

New technologies and ways of collaborating are shaping the ways software businesses build embedded systems for the avionics industry. Given new and high-impact opportunities in...
2 years 2 months ago
Testing Against Cyber-Attacks with Simulation Technology

Testing Against Cyber-Attacks with Simulation Technology

Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involving USBs brings to light the importance of testing the system against cyber...
5 years 11 months ago
How Does Your Software Security Measure Up?

How Does Your Software Security Measure Up?

In recent months, Wind River has offered a free software security assessment on our website.The survey is open to anyone and asks ten very brief yes/no security questions about...
6 years ago

Pagination

  • Current page 1
  • Page 2
  • Page 3
  • Page 4
  • …
  • Next page ››
  • Last page Last »

Wind River Blog

The Wind River Blog is made up of a variety of voices: executives, technologists and industry enthusiasts. We hope to foster conversations and encourage the sharing of insights regarding the evolving landscape of intelligent, connected systems with our ecosystem of customers, partners and colleagues.

Get our RSS feed

Subscribe

Enter your email address to receive notifications of new posts.

Popular Tags

Wind RiverVxWorksAerospace & DefenseLinux / Open SourceLinuxNetworkingSoftware EngineeringSecurityOpen SourceSimicsMulti-coreEclipseNFVIoT / M2MTools & SimulationvirtualizationIndustrial

Disclaimer

The postings on this site are the views of the individual poster and do not represent Wind River's positions, strategies or opinions. This site is subject to Wind River’s Terms of Use.

Products

  • Platforms
    • VxWorks
    • eLxr Pro
    • Wind River Cloud Platform
    • Helix Virtualization Platform
    • Wind River Linux
    • Zephyr
  • Studio Tools
    • Workspace
    • Diab Compiler
    • Pipelines
    • Test Automation
    • Virtual Lab
    • Intel® Simics®
    • OTA Updates
    • Conductor
    • Digital Feedback Loop
    • Analytics

Industries

  • Aerospace & Defense
  • Automotive
  • Energy
  • Enterprise
  • Industrial
  • Medical
  • Startups
  • Telecommunications

Security

  • Security Center
  • Vulnerability Responses
  • Linux Security Scanner
  • CVE Database

Explore

  • Resource Library
  • Intelligent Systems Research
  • Web Seminars & Events
  • Wind River Blog
  • Customer Stories
  • Learning Subscription
  • Guides to Intelligent Systems

Support

  • Wind River Support
  • Product Documentation

About

  • About Wind River
  • Newsroom
  • Awards
  • Executive Leadership Team
  • Partners
  • Careers
  • University Program
Support
Contact Us
Compliance at Wind River  | Privacy  | Feedback |
Country
U.S. Japan China

© 2025 Wind River Systems, Inc.
Facebook Twitter Linkedin Youtube
OSZAR »