A Timesys Deep Dive Embedded Systems Newsletter
- Cybersecurity news: 11 CVEs you need to know about
- Meet VigiShield Secure by Design: Security, simplified
- Key insights from our 2022 cybersecurity survey
- New security blogs: DM-Verity Without an Initramfs and Securing U-Boot
- Upcoming events: from Pittsburgh to Nuremberg, and Security Vulnerability Management 101
Cybersecurity in the News: The 11 CVEs You Need to Know About
Have you heard about this BusyBox flaw, these Azure Defender critical hijacking bugs, or this damaging heap buffer overflow flaw? With an average of 50 new CVEs every day, how do you cut through the noise and take action on the vulnerabilities that pose the largest threat to your device?
We’ve launched the Timesys CVE Dashboard, updated weekly with details on the dangerous security vulnerabilities that could be affecting your device.
Security is a complex, time-consuming, ever-evolving process that requires deep expertise across many disciplines. With VigiShield Secure by Design, we’ve distilled the security feature implementation process down into an easy-to-understand, PSA certified, maintainable Yocto security layer that can be configured to meet your current customer and regulatory (e.g. NISTIR 8259A and ETSI EN 303) requirements.
VigiShield leverages widely used open source technologies, enables underlying hardware capabilities for best performance, and implements the security best practices recommended by regulatory and industry-specific bodies (FDA, IEC, etc).
With security built-in using VigiShield, device manufacturers can focus more on innovation during the product development process and get to market faster.
The results are in!
Get your copy of the 2022 Timesys Cybersecurity Survey results! Featuring insights from more than 100 industry professionals, this infographic presents key learnings on the state of the industry for cybersecurity.
Learn with Timesys
Read up on embedded security with our two latest blogs
DM-Verity Without an Initramfs
Learn how you can implement file system verification on your embedded system without the use of an initramfs. This can significantly save boot time and storage requirements in many situations.
Securing U-Boot: A Guide to Mitigating Common Attack Vectors
Conferences Around the World You Don’t Want to Miss
Embedded Online Conference
A conference for embedded systems engineers
April 25-29, online
So much learning to do, and so little time. Don’t worry if you’re joining late — many talks are available on-demand.
Be sure to stop by the “demo” area to see our new Embedded Board Farm video!
Cybersecurity industry event
May 4, Pittsburgh, PA
Join us in our hometown for the 7th annual Cyburgh, a forum for cybersecurity, IT, and business professionals to engage with and learn from peers, thought leaders, and solution providers.
Our very own Al Feczko will present a tech talk on software supply chain security
2nd European Medical Device & Diagnostic Cybersecurity + Software Development & Compliance
Joint live conference
May 17-18, Brussels
We are thrilled to be sponsoring this year’s event, and our very own Maciej Halasz will be presenting on securing the open source embedded software supply chain for medical devices.
Embedded Technology Convention USA 2022
Embedded Technologies & Systems Showcase
June 8-9, Las Vegas, NV
Join us at the Embedded Tech Convention with 5000 of our closest friends! Discover the latest technological innovations and trends, expand your industry knowledge and extend your global professional network.
Embedded World 2022
Exhibition & Conference
June 21-23, Nuremberg
Will you be at Embedded World this year? We’re excited to showcase our latest security solutions as a featured partner with our friends at STMicroelectronics.
Security Vulnerability Management 101Tool & Techniques to Monitor and Remediate Vulnerabilities in Your SBOM
In this monthly live webinar and Q&A session, you’ll learn:
– Why you need to manage your open-source software risks
– How to generate an accurate SBOM (Software Bills of Materials) and why it matters
– Tools and techniques to monitor and remediate vulnerabilities in your SBOM
– And much more!