LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com    |  Contact Us          
Is vulnerability management a regular part of your product management? (Spoiler alert: It better be.)

Is vulnerability management a regular part of your product management? (Spoiler alert: It better be.)

Effective product security starts with good product management.

And a good product manager recognizes that product security does not stop with secure design.

Effective security demands monitoring, tracking and acting on vulnerabilities on an ongoing basis throughout the product lifecycle.

A dedicated product management approach to vulnerability management is really the only way to ensure that your end customers are not exposed to breach risk over time.

Continue reading “Is vulnerability management a regular part of your product management? (Spoiler alert: It better be.)” »

Continuous Testing Delivers Quality with Faster Time-to-Market

Continuous Testing Delivers Quality with Faster Time-to-Market

System quality requirements have never been higher. But time-to-market pressures have also never been greater. How do you meet one without sacrificing the other?

Embedded systems users expect bug free, responsive and stable applications that provide the best user experience.

The consequence of failing to meet user expectations can result in more than just application abandonment. With the power of social media, it also can quickly lead to a tarnished brand, resulting in lost revenue opportunities from both current and future users.

At the same time, increasing competition and security issues are leading to shorter development and delivery schedules, and quicker deployment of product updates and security fixes. So application failure or releasing a product with major bugs is not an option.

Continue reading “Continuous Testing Delivers Quality with Faster Time-to-Market” »

Build it fast, and build it secure: see the latest at Embedded World

Build it fast, and build it secure: see the latest at Embedded World

The world of embedded systems has gone through a massive transformation in recent years.

The rise of smart devices, the Internet of Things, mobile computing platforms, connected devices and a range of other innovations have driven embedded system deployments through the roof. Industry observers estimate IoT deployments alone account for 23 billion device deployments in 2018, up from 15 million in 2015. And that number is projected to triple in the next six years.

The explosion in demand has had a major impact on the makers of embedded systems and the products containing them.

Continue reading “Build it fast, and build it secure: see the latest at Embedded World” »

Tracking and Maintaining the Security of Embedded Systems

Tracking and Maintaining the Security of Embedded Systems

The deployment modes and functionality of embedded systems have evolved rapidly in recent years, thanks to widespread connectivity of Internet of Things devices and associated systems.

Yet the common security practices for most embedded systems remain largely unchanged from the days when they were isolated, air-gapped systems.

The shortfall in embedded system security is leading to sharply escalating risk of cyberbreaches. The trend is leading industry experts to advise embedded system developers to make security a top priority in design practices and product development.

Continue reading “Tracking and Maintaining the Security of Embedded Systems” »

The Risks of a ‘Stale, Abandoned’ Product

The Risks of a ‘Stale, Abandoned’ Product

Some product management decisions are hard. Product managers are constantly weighing trade-offs among time-to-market, functionality, competitive differentiation, development costs and other factors.

But some product decisions seem like no-brainers. Would you bring an IT product to market that puts customers at significantly increased risk of security breaches, privacy violations, potentially massive fines, and lawsuits?

“Of course not. That would be lunacy,” you can imagine the typical product manager as saying. Yet companies are shipping products every day that introduce this sort of risk into customer environments.

Continue reading “The Risks of a ‘Stale, Abandoned’ Product” »