It's not a fair fight - Cybersecurity helps
Wind River

It's not a fair fight - Cybersecurity helps

When attacking an embedded system, it takes only one vulnerability to lead to an exploit.

Subscribe

Wind River and Star Lab security experts conduct a deep-dive training on the specific steps necessary to secure your embedded systems, using 10 essential principles. A practical guidance is provided in how to prepare your system for a rapidly evolving threat landscape, and you'll get a chance to ask our technical experts your most pressing security questions. 

After the session, you are invited to request a company-specific training for your whole team that covers all 10 properties.

If you go the individual route, OnDemand session available are Secure Boot and Secure Hypervisor. 

Upcoming planned events are July 28 Secure OS and Sept 8 Container Security.  More session will be scheduled soon.

The experts at Star Lab, the Wind River cybersecurity and technology protection group include: Jonathan Kline, CTO; Ryan Thibodeaux Principal Technologist – Embedded Security, and Michael Mehlberg, VP Marketing

Secure OS (July 28)

97% of risk management professionals said they believed unsecured IoT devices could be open to a “catastrophic” security breach (Ponemon Institute, 2018).

Traditional embedded OSes have limited protections between processes and application/system dependencies. A large attack surface enables a single exploit to compromise the integrity of the entire system. Learn how to implement Linux securely on an embedded system.

What you will learn:

  • How to harden your embedded operating system
  • How to reduce the attack surface by removing code and interfaces that are not absolutely required
  • How to leverage defense in depth on your embedded device

Container Security (Sept 8)

Containerized applications are expected to grow by 29% by 2026 — but 60% of security professionals surveyed reported security incidents with their container usage (ResearchAndMarkets, 2021). Containerization of code helps mitigate such attacks and prevents an exploit of any one component from affecting others.

What you will learn:

  • How containerization affects (and doesn’t affect) application and systems security
  • The benefits of containerization on secure embedded systems

How even exploited software can be constrained to limit the reach of an attacker

Secure Boot (OnDemand)

Of information security professionals surveyed, 53% believe it likely their enterprise will experience a cyberattack in the next 12 months (ISACA 2020).

Boot attacks are a common method used to enable unauthorized applications and system modifications. Learn how to ensure a well-engineered secure boot sequence from the experts at Star Lab, the Wind River cybersecurity and technology protection group.

What you will learn:

  • A strong, secure boot sequence to maintain system integrity and authenticity
  • Commonly available secure boot technologies and the pros and cons of each
  • Proper storage and release of crypto keys in a secure boot sequence

Secure Hypervisor (OnDemand)

The edge/embedded hypervisor market is projected to grow to $197.6M in 2024, at a CAGR of 7.1% (VDC Research 2020).

As adoption of virtualization increases, hypervisors help optimize the underlying hardware’s resources and functionality. Find out why embedded virtualization can be more performant and more secure than enterprise-level virtualization.

What you will learn:

  • The performance implications of embedded virtualization
  • How embedded virtualization enhances security
  • How to secure your own embedded system with high-performance virtualization